Analysis
-
max time kernel
129s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 18:37
Static task
static1
Behavioral task
behavioral1
Sample
74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe
Resource
win10v2004-20221111-en
General
-
Target
74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe
-
Size
1.7MB
-
MD5
575efa7c7559db67471ddd64608c9381
-
SHA1
b40b8ad805b235a076bc94d40ef99a97e66ab8cb
-
SHA256
74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a
-
SHA512
12642ded18c7dbf18c5c68220ac92a1b37c7f8e0bfa8a52079010763e08f50284281294c874122142e8fa1ba4a9297ab603ef5284f07af9b0f3deae935742c68
-
SSDEEP
24576:r0otxM+C8vJNWRbElPprVE3fil1s7QlqIR28WV8+t6FZVAAb6amPA9MBzgK:Ptf3qR/alCklqIgF8+tuAs6a+Jp
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\windowsapplication\\windowsapplication.exe" 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe -
Executes dropped EXE 1 IoCs
pid Process 520 windowsapplication .exe -
Loads dropped DLL 1 IoCs
pid Process 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 520 windowsapplication .exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe Token: SeDebugPrivilege 520 windowsapplication .exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 520 windowsapplication .exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1168 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 28 PID 2040 wrote to memory of 1168 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 28 PID 2040 wrote to memory of 1168 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 28 PID 2040 wrote to memory of 1168 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 28 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 1168 wrote to memory of 556 1168 cmd.exe 31 PID 1168 wrote to memory of 556 1168 cmd.exe 31 PID 1168 wrote to memory of 556 1168 cmd.exe 31 PID 1168 wrote to memory of 556 1168 cmd.exe 31 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 2040 wrote to memory of 520 2040 74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe 30 PID 556 wrote to memory of 1324 556 wscript.exe 32 PID 556 wrote to memory of 1324 556 wscript.exe 32 PID 556 wrote to memory of 1324 556 wscript.exe 32 PID 556 wrote to memory of 1324 556 wscript.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe"C:\Users\Admin\AppData\Local\Temp\74fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Roaming\windowsapplication\mata.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Roaming\windowsapplication\invs.vbs" "C:\Users\Admin\AppData\Roaming\windowsapplication\mata2.bat3⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\windowsapplication\mata2.bat" "4⤵PID:1324
-
-
-
-
C:\Users\Admin\AppData\Roaming\windowsapplication .exe"C:\Users\Admin\AppData\Roaming\windowsapplication .exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9
-
Filesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
Filesize
91B
MD5159738d5f6cc0b140aef05d041e0e9d0
SHA1dd42b039afbf23fdcd7683806ae6491db2fc0872
SHA256675cc6e50de69fcac9f7e19e221f99f9fcfdc6840244a65f304f1259aca8c5d9
SHA512af94ac9043f484614bd2b5a96546e7cc3eb3bc4860e513f41d9edd0ce52444f5835089ea1df622f8c6b66deaf6941bf71a8872c6a80400e3dfc076402bcf58df
-
Filesize
107B
MD5ea5f4fdc6f6e86af034ee1eccdef78d1
SHA15bec29914ccf32c6a483a11266deb8f6af307fc2
SHA2563bff022d39673f3a9605a0a67a41115ebe687792639910731595e9be1960034f
SHA512d38a6b8fb46ee9f319489fe75146178ba1921c3e2bad2dc5e8434d93f7166ea8194effd71acb850333640a890446055e4bf02fcf61accf00557d96314d3cedb0
-
Filesize
1.7MB
MD5575efa7c7559db67471ddd64608c9381
SHA1b40b8ad805b235a076bc94d40ef99a97e66ab8cb
SHA25674fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a
SHA51212642ded18c7dbf18c5c68220ac92a1b37c7f8e0bfa8a52079010763e08f50284281294c874122142e8fa1ba4a9297ab603ef5284f07af9b0f3deae935742c68
-
Filesize
1.7MB
MD5575efa7c7559db67471ddd64608c9381
SHA1b40b8ad805b235a076bc94d40ef99a97e66ab8cb
SHA25674fd2131b4067a703629f07166467f28c1fd96d58143c45ca5cd741bb1f1cc1a
SHA51212642ded18c7dbf18c5c68220ac92a1b37c7f8e0bfa8a52079010763e08f50284281294c874122142e8fa1ba4a9297ab603ef5284f07af9b0f3deae935742c68
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9