Analysis
-
max time kernel
149s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 18:34
Static task
static1
Behavioral task
behavioral1
Sample
7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe
Resource
win10v2004-20221111-en
General
-
Target
7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe
-
Size
318KB
-
MD5
82d802a6ac29df8fe6be7a80669da4d5
-
SHA1
c80de466261ca7a0a5ebba3f349845cf8aee8535
-
SHA256
7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f
-
SHA512
d3bcabc05e0df8aaef55d33cbbf09fa673dbe58caa446a5f4decb8bc03add26e58b198853459c894c069e39a56180ac026ccce9f84e4875fff2b6e5b9eed7295
-
SSDEEP
6144:qe03LBlo3Y+4SAMEarbE4XT72juSTxBAEC7U0HGNC1xHuoDxi+PRUTS:qeS+1A0raHjnCQ0HY0Oou
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\AdobeFlashCheck,explorer.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1836 set thread context of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe Token: SeDebugPrivilege 2032 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2032 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2036 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 27 PID 1836 wrote to memory of 2036 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 27 PID 1836 wrote to memory of 2036 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 27 PID 1836 wrote to memory of 2036 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 27 PID 2036 wrote to memory of 1740 2036 cmd.exe 29 PID 2036 wrote to memory of 1740 2036 cmd.exe 29 PID 2036 wrote to memory of 1740 2036 cmd.exe 29 PID 2036 wrote to memory of 1740 2036 cmd.exe 29 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30 PID 1836 wrote to memory of 2032 1836 7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe"C:\Users\Admin\AppData\Local\Temp\7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\AdobeFlashCheck,explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\AdobeFlashCheck,explorer.exe"3⤵
- Modifies WinLogon for persistence
PID:1740
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe"C:\Users\Admin\AppData\Local\Temp\7ad17a294bc535c8e1d5c3033bd131d1fdc49fe03d7900c61ba64835f640652f.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2032
-