Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:07
Behavioral task
behavioral1
Sample
cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe
Resource
win10v2004-20221111-en
General
-
Target
cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe
-
Size
196KB
-
MD5
f531e94c0ad82f7260a1b18e7e697630
-
SHA1
e5df0b88b9aea89c6b60a70ec45901115126859f
-
SHA256
cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4
-
SHA512
6fc706d24fa71f51994a0d38d3fb9a624e4c4f0b868d0dae266cbe1756de9455ac1a659099fbb6a121497cacbdef6e0617b4cb19d20c5f84bd778065b8b3a428
-
SSDEEP
6144:9LGxr3oNE65fYG/YAqfZAiKB1MAmVEM9xQ:9m3oN5f9qhK7jAEMk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
winlogons.exewinlogons.exepid process 1728 winlogons.exe 520 winlogons.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Processes:
resource yara_rule behavioral1/memory/1408-67-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1408-69-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Loads dropped DLL 6 IoCs
Processes:
cmd.exewinlogons.exewinlogons.exepid process 1148 cmd.exe 1728 winlogons.exe 1728 winlogons.exe 1728 winlogons.exe 520 winlogons.exe 520 winlogons.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
winlogons.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ar = "C:\\Drivers\\scsi\\winlogons.exe " winlogons.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
winlogons.exepid process 1728 winlogons.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exedescription pid process Token: SeRestorePrivilege 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe Token: SeBackupPrivilege 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.execmd.exewinlogons.exedescription pid process target process PID 1408 wrote to memory of 1148 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe cmd.exe PID 1408 wrote to memory of 1148 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe cmd.exe PID 1408 wrote to memory of 1148 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe cmd.exe PID 1408 wrote to memory of 1148 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe cmd.exe PID 1408 wrote to memory of 1148 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe cmd.exe PID 1408 wrote to memory of 1148 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe cmd.exe PID 1408 wrote to memory of 1148 1408 cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe cmd.exe PID 1148 wrote to memory of 1728 1148 cmd.exe winlogons.exe PID 1148 wrote to memory of 1728 1148 cmd.exe winlogons.exe PID 1148 wrote to memory of 1728 1148 cmd.exe winlogons.exe PID 1148 wrote to memory of 1728 1148 cmd.exe winlogons.exe PID 1148 wrote to memory of 1728 1148 cmd.exe winlogons.exe PID 1148 wrote to memory of 1728 1148 cmd.exe winlogons.exe PID 1148 wrote to memory of 1728 1148 cmd.exe winlogons.exe PID 1148 wrote to memory of 652 1148 cmd.exe attrib.exe PID 1148 wrote to memory of 652 1148 cmd.exe attrib.exe PID 1148 wrote to memory of 652 1148 cmd.exe attrib.exe PID 1148 wrote to memory of 652 1148 cmd.exe attrib.exe PID 1148 wrote to memory of 652 1148 cmd.exe attrib.exe PID 1148 wrote to memory of 652 1148 cmd.exe attrib.exe PID 1148 wrote to memory of 652 1148 cmd.exe attrib.exe PID 1728 wrote to memory of 520 1728 winlogons.exe winlogons.exe PID 1728 wrote to memory of 520 1728 winlogons.exe winlogons.exe PID 1728 wrote to memory of 520 1728 winlogons.exe winlogons.exe PID 1728 wrote to memory of 520 1728 winlogons.exe winlogons.exe PID 1728 wrote to memory of 520 1728 winlogons.exe winlogons.exe PID 1728 wrote to memory of 520 1728 winlogons.exe winlogons.exe PID 1728 wrote to memory of 520 1728 winlogons.exe winlogons.exe PID 1728 wrote to memory of 1732 1728 winlogons.exe cmd.exe PID 1728 wrote to memory of 1732 1728 winlogons.exe cmd.exe PID 1728 wrote to memory of 1732 1728 winlogons.exe cmd.exe PID 1728 wrote to memory of 1732 1728 winlogons.exe cmd.exe PID 1728 wrote to memory of 1732 1728 winlogons.exe cmd.exe PID 1728 wrote to memory of 1732 1728 winlogons.exe cmd.exe PID 1728 wrote to memory of 1732 1728 winlogons.exe cmd.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe"C:\Users\Admin\AppData\Local\Temp\cc039bb48f6acf21e04296300ec4080b48ec077d79e76dcd4fe7171ff9a294f4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Drivers\Scsi\sys.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Drivers\scsi\winlogons.exeC:\Drivers\scsi\winlogons.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Drivers\scsi\winlogons.exeC:\Drivers\scsi\winlogons.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:520 -
C:\Windows\SysWOW64\cmd.execmd.exe4⤵PID:1732
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\Drivers3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD5d8b115523ba4129595be2f4af8c919ff
SHA1d725acb78a8a576527ae3e9620c31122bd8f9554
SHA25620b624b6596ccd034738676a0a347f45b52aca968b739fe98d14bdfc4317de8b
SHA5126806be44be348c1b13ce8934bc61d1cdaf168df8afab2ddb60e36383380bb39ffbbfbb08171b0128e811558866b4c83961181f91a0b1f70565c1ae66b4ad7e26
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16
-
Filesize
289KB
MD534fc62a2598738b1e46bb3854ed859d2
SHA1c9fd5dd8718d37b26e4b4032c6b80ea45841f0c4
SHA256e8bed9f64e4ae4d7b5d709d6210c0c86e033abebcf7f95d1077dcaca54549a32
SHA5125a98a763cd7d1a060af52efecd4780e99e5de33f3ccf955b2f6d41c051b7a39650ceba3b3bd8f8209d4a24d6d1afbad27baf35a548311ee9c079ae3838ba8d16