Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:01
Static task
static1
Behavioral task
behavioral1
Sample
17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe
Resource
win10v2004-20220901-en
General
-
Target
17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe
-
Size
764KB
-
MD5
c45e484369e6ca2c0ef71081ccf4ebcc
-
SHA1
0e0c088f3c21c38bd632b0e2f17f9d92380d927f
-
SHA256
17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432
-
SHA512
3f5f695ef174767fc2ed0186271c4abb13af4f96f1363ae9d932a4bb4002314f76ea6193c60e7d85ef27670298ffe7b6cdd6a8a93a91fdd00f28e52f47a3c4cc
-
SSDEEP
12288:u6sYsxzMehtfiAlpoEjmWIpNNtT9g7l9uf+tUnmSkb+whmM95:rpsFjrpo0mNjU4vbwn
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 984 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exepid process 1048 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nisswev = "\"C:\\Users\\Admin\\AppData\\Roaming\\GissRun.exe\"" 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exedescription pid process target process PID 1048 wrote to memory of 984 1048 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe cmd.exe PID 1048 wrote to memory of 984 1048 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe cmd.exe PID 1048 wrote to memory of 984 1048 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe cmd.exe PID 1048 wrote to memory of 984 1048 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe cmd.exe PID 1048 wrote to memory of 984 1048 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe cmd.exe PID 1048 wrote to memory of 984 1048 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe cmd.exe PID 1048 wrote to memory of 984 1048 17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe"C:\Users\Admin\AppData\Local\Temp\17e067dabe2239adf25b6f748c2bee8e255912632033188b00b685f0142e7432.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c \DelUS.bat2⤵
- Deletes itself
PID:984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD510cea5c9b92cdcba370ad6d2c0b99caf
SHA1a1e74474e137983da9183a6fdd04b2d4c494d070
SHA256934c2aacf5dc7936c216c9e728726b4f1d60c7c5d2d5701499c96c21dfdee397
SHA512fc9fb30a761db8a2cf46bfaaa38ebe4b9b8fd12d8831c88c09f6952974df4b0e293541a83c0811cd7d12b73f0d4d54606a40be00fa0eea33d2abb1b9aeb95c1b
-
Filesize
24KB
MD57bf1bd7661385621c7908e36958f582e
SHA143242d7731c097e95fb96753c8262609ff929410
SHA256c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e
SHA5128317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f