Analysis
-
max time kernel
148s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe
Resource
win10v2004-20221111-en
General
-
Target
8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe
-
Size
345KB
-
MD5
df3dea2710d684c6606fd6b7b182f2c4
-
SHA1
00e80c47352c7d73de1a7aff94c6c39fade997d7
-
SHA256
8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c
-
SHA512
bbeeb332098353904a3aedac70c56cd5c803ad78fe84f54891d8bca30a10c743d62581f207d3e84e8d61f2ca8e33e87ac638b1c483be0eec84611997e5581dc8
-
SSDEEP
6144:uDkjip+aCO8Ekb8sTUI3+kSjpwvjdn3lfhuUtko88/8I9ifk:+ktaCik9R3WwrjVkI9iM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\SubFolder\\SubFolder\\winlogon.exe" winlogon.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1516 set thread context of 1708 1516 winlogon.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1708 winlogon.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1520 8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1708 winlogon.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 winlogon.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1516 1520 8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe 27 PID 1520 wrote to memory of 1516 1520 8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe 27 PID 1520 wrote to memory of 1516 1520 8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe 27 PID 1520 wrote to memory of 1516 1520 8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe 27 PID 1516 wrote to memory of 1356 1516 winlogon.exe 28 PID 1516 wrote to memory of 1356 1516 winlogon.exe 28 PID 1516 wrote to memory of 1356 1516 winlogon.exe 28 PID 1516 wrote to memory of 1356 1516 winlogon.exe 28 PID 1516 wrote to memory of 1744 1516 winlogon.exe 29 PID 1516 wrote to memory of 1744 1516 winlogon.exe 29 PID 1516 wrote to memory of 1744 1516 winlogon.exe 29 PID 1516 wrote to memory of 1744 1516 winlogon.exe 29 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30 PID 1516 wrote to memory of 1708 1516 winlogon.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe"C:\Users\Admin\AppData\Local\Temp\8dc87564e798918da03ca73d100dd2623c239319a687550ca1ca364d5782b66c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"3⤵PID:1356
-
-
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"3⤵PID:1744
-
-
C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"C:\Users\Admin\AppData\Roaming\SubFolder\SubFolder\winlogon.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1708
-
-