Analysis
-
max time kernel
64s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 07:17
Static task
static1
Behavioral task
behavioral1
Sample
a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe
Resource
win10v2004-20221111-en
General
-
Target
a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe
-
Size
115KB
-
MD5
f83811baceb47fee0563fc1b91f9e97f
-
SHA1
c8b2a2151803e3596d102bee8e518f21c5d3d852
-
SHA256
a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1
-
SHA512
03cc94e8c2cecd4e8244dc6ffb1b23aa31c40ef24460e0276531e61a109789cc9efe7d41afca41f59a16256cef79629eaa1c54ec6dd85d507b34a4027cd34123
-
SSDEEP
3072:cU143UTXqhlYDnU/+FpwXmR7Iq2+YlbWa3rdWuLqfUl:nXqfE7wX82ZLqfU
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
explorer.exe8C4K5EKGB82A48E.exepid process 944 explorer.exe 820 8C4K5EKGB82A48E.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\explorer\explorer.exe vmprotect C:\Users\Admin\AppData\Roaming\explorer\explorer.exe vmprotect C:\Users\Admin\AppData\Roaming\explorer\explorer.exe vmprotect behavioral1/memory/944-59-0x000000013FB00000-0x0000000140395000-memory.dmp vmprotect \Users\Admin\AppData\Roaming\explorer\explorer.exe vmprotect \Users\Admin\AppData\Roaming\explorer\explorer.exe vmprotect \Users\Admin\AppData\Roaming\explorer\explorer.exe vmprotect behavioral1/memory/944-64-0x000000013FB00000-0x0000000140395000-memory.dmp vmprotect -
Loads dropped DLL 5 IoCs
Processes:
cmd.exeWerFault.exea1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exepid process 1472 cmd.exe 828 WerFault.exe 828 WerFault.exe 828 WerFault.exe 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\AppData\\Roaming\\explorer\\explorer.exe" a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 828 944 WerFault.exe explorer.exe -
Processes:
8C4K5EKGB82A48E.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 8C4K5EKGB82A48E.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 8C4K5EKGB82A48E.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 8C4K5EKGB82A48E.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
explorer.exepid process 944 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8C4K5EKGB82A48E.exepid process 820 8C4K5EKGB82A48E.exe 820 8C4K5EKGB82A48E.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.execmd.exeexplorer.exedescription pid process target process PID 1160 wrote to memory of 1472 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe cmd.exe PID 1160 wrote to memory of 1472 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe cmd.exe PID 1160 wrote to memory of 1472 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe cmd.exe PID 1160 wrote to memory of 1472 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe cmd.exe PID 1472 wrote to memory of 944 1472 cmd.exe explorer.exe PID 1472 wrote to memory of 944 1472 cmd.exe explorer.exe PID 1472 wrote to memory of 944 1472 cmd.exe explorer.exe PID 1472 wrote to memory of 944 1472 cmd.exe explorer.exe PID 944 wrote to memory of 828 944 explorer.exe WerFault.exe PID 944 wrote to memory of 828 944 explorer.exe WerFault.exe PID 944 wrote to memory of 828 944 explorer.exe WerFault.exe PID 1160 wrote to memory of 820 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe 8C4K5EKGB82A48E.exe PID 1160 wrote to memory of 820 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe 8C4K5EKGB82A48E.exe PID 1160 wrote to memory of 820 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe 8C4K5EKGB82A48E.exe PID 1160 wrote to memory of 820 1160 a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe 8C4K5EKGB82A48E.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe"C:\Users\Admin\AppData\Local\Temp\a1bdd92ff181ec9f2acb12ced6b8b0e2fb63be305c6ba7ddcac3b8a3cb2577d1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Admin\AppData\Roaming\explorer\explorer.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\explorer\explorer.exeC:\Users\Admin\AppData\Roaming\explorer\explorer.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 944 -s 564⤵
- Loads dropped DLL
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\8C4K5EKGB82A48E.exe<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <HTML><HEAD> <TITLE>509 Bandwidth Limit Exceeded</TITLE> </HEAD><BODY> <H1>Bandwidth Limit Exceeded</H1> The server is temporarily unable to service your request due to the site owner reaching his/her bandwidth limit. Please try again later. </BODY></HTML>2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8C4K5EKGB82A48E.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Local\Temp\8C4K5EKGB82A48E.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
C:\Users\Admin\AppData\Roaming\explorer\explorer.exeFilesize
5.2MB
MD5dee1568dc4d523e4aff5c7563b26887c
SHA1565a8f3d02746fb203c5a7e2777211bf33cf656b
SHA256f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b
SHA5120e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2
-
C:\Users\Admin\AppData\Roaming\explorer\explorer.exeFilesize
5.2MB
MD5dee1568dc4d523e4aff5c7563b26887c
SHA1565a8f3d02746fb203c5a7e2777211bf33cf656b
SHA256f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b
SHA5120e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2
-
\Users\Admin\AppData\Local\Temp\8C4K5EKGB82A48E.exeFilesize
8KB
MD58719ce641e7c777ac1b0eaec7b5fa7c7
SHA1c04de52cb511480cc7d00d67f1d9e17b02d6406b
SHA2566283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea
SHA5127be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97
-
\Users\Admin\AppData\Roaming\explorer\explorer.exeFilesize
5.2MB
MD5dee1568dc4d523e4aff5c7563b26887c
SHA1565a8f3d02746fb203c5a7e2777211bf33cf656b
SHA256f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b
SHA5120e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2
-
\Users\Admin\AppData\Roaming\explorer\explorer.exeFilesize
5.2MB
MD5dee1568dc4d523e4aff5c7563b26887c
SHA1565a8f3d02746fb203c5a7e2777211bf33cf656b
SHA256f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b
SHA5120e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2
-
\Users\Admin\AppData\Roaming\explorer\explorer.exeFilesize
5.2MB
MD5dee1568dc4d523e4aff5c7563b26887c
SHA1565a8f3d02746fb203c5a7e2777211bf33cf656b
SHA256f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b
SHA5120e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2
-
\Users\Admin\AppData\Roaming\explorer\explorer.exeFilesize
5.2MB
MD5dee1568dc4d523e4aff5c7563b26887c
SHA1565a8f3d02746fb203c5a7e2777211bf33cf656b
SHA256f7cbf79fce9ca7d06745604a44c6b2541af476cdd8f5853bf1dbf23213eb3d2b
SHA5120e593e23f5cfbf3bf0cc07373bb013911e9c2068cfad8e666c69173afbe29d06a0635dc32dfa6baca153db2e1de25772cccbc5f63d49d19bc4d18b93f7c97ab2
-
memory/820-66-0x0000000000000000-mapping.dmp
-
memory/820-69-0x000000013F550000-0x000000013F556000-memory.dmpFilesize
24KB
-
memory/820-70-0x000007FEFBB21000-0x000007FEFBB23000-memory.dmpFilesize
8KB
-
memory/820-71-0x000000001AE29000-0x000000001AE48000-memory.dmpFilesize
124KB
-
memory/828-60-0x0000000000000000-mapping.dmp
-
memory/944-64-0x000000013FB00000-0x0000000140395000-memory.dmpFilesize
8.6MB
-
memory/944-59-0x000000013FB00000-0x0000000140395000-memory.dmpFilesize
8.6MB
-
memory/944-56-0x0000000000000000-mapping.dmp
-
memory/1472-54-0x0000000000000000-mapping.dmp