Analysis
-
max time kernel
218s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:06
Static task
static1
Behavioral task
behavioral1
Sample
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe
Resource
win10v2004-20221111-en
General
-
Target
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe
-
Size
148KB
-
MD5
7c2943a27fa8a7eb008f23a012e2417a
-
SHA1
5a13018bdd5578367841091d7d438dd825cb76c5
-
SHA256
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf
-
SHA512
d8293cdf5a2c293b4be3b84596fa5144becb536c746024e9073f01afc37c27b8d4ec5bc4057fa85c7ad4fea3a2a21d17377b3247666c1fc9c29bf1ba20fea0d8
-
SSDEEP
1536:CpRZDY5HmunFKtcDrNoLiD3Fvvow149Tlj5CjEhBQ79aXNJ8PcO1zcA7GCBjv4BE:qvY53r9DFHN149d5CgBQJadJXOh7j0E
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e0d7b5e.exe explorer.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\e0d7b5 = "C:\\e0d7b5e\\e0d7b5e.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*0d7b5 = "C:\\e0d7b5e\\e0d7b5e.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\e0d7b5e = "C:\\Users\\Admin\\AppData\\Roaming\\e0d7b5e.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*0d7b5e = "C:\\Users\\Admin\\AppData\\Roaming\\e0d7b5e.exe" explorer.exe -
Drops file in Windows directory 1 IoCs
Processes:
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exedescription ioc process File opened for modification C:\Windows\d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.INI d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 536 vssadmin.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exeexplorer.exepid process 1820 d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe 1168 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exepid process 1820 d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe 1820 d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exepid process 1820 d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exeexplorer.exedescription pid process target process PID 1820 wrote to memory of 1168 1820 d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe explorer.exe PID 1820 wrote to memory of 1168 1820 d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe explorer.exe PID 1820 wrote to memory of 1168 1820 d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe explorer.exe PID 1820 wrote to memory of 1168 1820 d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe explorer.exe PID 1168 wrote to memory of 568 1168 explorer.exe svchost.exe PID 1168 wrote to memory of 568 1168 explorer.exe svchost.exe PID 1168 wrote to memory of 568 1168 explorer.exe svchost.exe PID 1168 wrote to memory of 568 1168 explorer.exe svchost.exe PID 1168 wrote to memory of 536 1168 explorer.exe vssadmin.exe PID 1168 wrote to memory of 536 1168 explorer.exe vssadmin.exe PID 1168 wrote to memory of 536 1168 explorer.exe vssadmin.exe PID 1168 wrote to memory of 536 1168 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe"C:\Users\Admin\AppData\Local\Temp\d5bccc9160adad0a89c05396837144e542f975c72a39cf94be27e5393a7101bf.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\syswow64\svchost.exe-k netsvcs3⤵PID:568
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:536