Analysis
-
max time kernel
149s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:39
Static task
static1
Behavioral task
behavioral1
Sample
2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe
Resource
win10v2004-20221111-en
General
-
Target
2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe
-
Size
513KB
-
MD5
54f50f9113735eda1abb252942a1e2a6
-
SHA1
59cfb1d4c66cae5e1f144c37ded3de5f150c89d0
-
SHA256
2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c
-
SHA512
a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124
-
SSDEEP
6144:eACT0ekq+7G40l/qDAqmglWGbl7sv6Q180p9wC4X:eACTR+76/jqPlWKsdXw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Java1.exepid process 1680 Java1.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 2 IoCs
Processes:
2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exepid process 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
reg.exereg.exeJava1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\GameGuardBypasser = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Sounds11.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\GameGuardBypasser = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Sounds11.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\c05b657da890bda2ab3f68171f729ab4 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Java1.exe\" .." Java1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\c05b657da890bda2ab3f68171f729ab4 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Java1.exe\" .." Java1.exe -
Drops file in Windows directory 2 IoCs
Processes:
2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
Java1.exepid process 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe 1680 Java1.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exeJava1.exedescription pid process Token: SeDebugPrivilege 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe Token: 33 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe Token: SeIncBasePriorityPrivilege 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe Token: SeDebugPrivilege 1680 Java1.exe Token: 33 1680 Java1.exe Token: SeIncBasePriorityPrivilege 1680 Java1.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.execmd.exeJava1.execmd.exedescription pid process target process PID 1444 wrote to memory of 1716 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe cmd.exe PID 1444 wrote to memory of 1716 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe cmd.exe PID 1444 wrote to memory of 1716 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe cmd.exe PID 1444 wrote to memory of 1716 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe cmd.exe PID 1716 wrote to memory of 556 1716 cmd.exe reg.exe PID 1716 wrote to memory of 556 1716 cmd.exe reg.exe PID 1716 wrote to memory of 556 1716 cmd.exe reg.exe PID 1716 wrote to memory of 556 1716 cmd.exe reg.exe PID 1444 wrote to memory of 1680 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe Java1.exe PID 1444 wrote to memory of 1680 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe Java1.exe PID 1444 wrote to memory of 1680 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe Java1.exe PID 1444 wrote to memory of 1680 1444 2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe Java1.exe PID 1680 wrote to memory of 1956 1680 Java1.exe cmd.exe PID 1680 wrote to memory of 1956 1680 Java1.exe cmd.exe PID 1680 wrote to memory of 1956 1680 Java1.exe cmd.exe PID 1680 wrote to memory of 1956 1680 Java1.exe cmd.exe PID 1956 wrote to memory of 1376 1956 cmd.exe reg.exe PID 1956 wrote to memory of 1376 1956 cmd.exe reg.exe PID 1956 wrote to memory of 1376 1956 cmd.exe reg.exe PID 1956 wrote to memory of 1376 1956 cmd.exe reg.exe PID 1680 wrote to memory of 996 1680 Java1.exe netsh.exe PID 1680 wrote to memory of 996 1680 Java1.exe netsh.exe PID 1680 wrote to memory of 996 1680 Java1.exe netsh.exe PID 1680 wrote to memory of 996 1680 Java1.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe"C:\Users\Admin\AppData\Local\Temp\2725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GameGuardBypasser" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Sounds11.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GameGuardBypasser" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Sounds11.exe3⤵
- Adds Run key to start application
PID:556 -
C:\Users\Admin\AppData\Roaming\Java1.exe"C:\Users\Admin\AppData\Roaming\Java1.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GameGuardBypasser" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Sounds11.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GameGuardBypasser" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Sounds11.exe4⤵
- Adds Run key to start application
PID:1376 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Java1.exe" "Java1.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
513KB
MD554f50f9113735eda1abb252942a1e2a6
SHA159cfb1d4c66cae5e1f144c37ded3de5f150c89d0
SHA2562725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c
SHA512a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124
-
Filesize
513KB
MD554f50f9113735eda1abb252942a1e2a6
SHA159cfb1d4c66cae5e1f144c37ded3de5f150c89d0
SHA2562725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c
SHA512a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124
-
Filesize
513KB
MD554f50f9113735eda1abb252942a1e2a6
SHA159cfb1d4c66cae5e1f144c37ded3de5f150c89d0
SHA2562725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c
SHA512a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124
-
Filesize
514B
MD57b19a23fe73ab279b721605d6ab5c933
SHA1a02c9ac1dad19ea82471bedef4875ce059428020
SHA256a57885af5782d21c79b2976e0d6cc3b7869fa6c90cc61e085357f3700521d427
SHA51212832efd6dafc3d2c26297cc1228e75661b95d085fdc6a5eaab30b249ab9dbea2dc690f0ff6a23ec6c05b823687ceb86551f385ee3fd1e0e21a0c1344f120e8a
-
Filesize
513KB
MD554f50f9113735eda1abb252942a1e2a6
SHA159cfb1d4c66cae5e1f144c37ded3de5f150c89d0
SHA2562725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c
SHA512a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124
-
Filesize
513KB
MD554f50f9113735eda1abb252942a1e2a6
SHA159cfb1d4c66cae5e1f144c37ded3de5f150c89d0
SHA2562725fd24ec853c1724c27bfde996f93baf9f44c9c8f96b6e59708959694b6a3c
SHA512a9bd8c367471aae9e9696cb57866f4b5d7485e704d8cd62687b66613e7ec5a44322bcccce3756d7f9cff8f7e3b4c56aba7c6e8060eaefe0967250e2b40ef6124