Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21-11-2022 20:15
Static task
static1
Behavioral task
behavioral1
Sample
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe
Resource
win10-20220812-en
General
-
Target
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe
-
Size
76KB
-
MD5
d43ca72d6fd0c9a2e3f3774b74fd5028
-
SHA1
d28a3f9edb5651de9c7a418e63f8417105c83c63
-
SHA256
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688
-
SHA512
b4e5a5df2885d59ff7f4c8325ee7b00be592a62c2ee006244e9d5a8cc67adcb6b15f557146030b9079960b538dddda8626443b9c2ebbe9f31b6e40ab87cfc639
-
SSDEEP
1536:EwHgiRJFKfgYBUngABZvxZ/DOG8s8MkeNSzXzKD:EwASJFKRapBZP/Dl8DMDSzX+D
Malware Config
Extracted
bitrat
1.38
37.139.128.233:3569
-
communication_password
ce952068942604a6d6df06ed5002fad6
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bawhjfpgez = "\"C:\\Users\\Admin\\AppData\\Roaming\\Etfdnl\\Bawhjfpgez.exe\"" 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exepid process 3108 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 3108 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 3108 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 3108 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 3108 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exedescription pid process target process PID 2024 set thread context of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
powershell.exe8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exepid process 1452 powershell.exe 1452 powershell.exe 1452 powershell.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exepowershell.exe8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exedescription pid process Token: SeDebugPrivilege 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeShutdownPrivilege 3108 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exepid process 3108 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 3108 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exedescription pid process target process PID 2024 wrote to memory of 1452 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe powershell.exe PID 2024 wrote to memory of 1452 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe powershell.exe PID 2024 wrote to memory of 1452 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe powershell.exe PID 2024 wrote to memory of 2660 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 2660 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 2660 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4464 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4464 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4464 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4932 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4932 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4932 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4852 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4852 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 4852 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3760 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3760 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3760 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe PID 2024 wrote to memory of 3108 2024 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe 8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe"C:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exeC:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe2⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exeC:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe2⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exeC:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe2⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exeC:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe2⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exeC:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe2⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exeC:\Users\Admin\AppData\Local\Temp\8dd93fd81577033b184647b566e160699006396bcc6cbfff405acc4597c0d688.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3108