Analysis
-
max time kernel
132s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe
Resource
win10v2004-20221111-en
General
-
Target
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe
-
Size
97KB
-
MD5
e3224603fe2aaaec7a274c5d55252a04
-
SHA1
8e815fc7e307485fa34e12f4f8e408bb10ea23dd
-
SHA256
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6
-
SHA512
f01581ffebbde05c11de55d500b41c6129bbaa1134bbb22869ed160c9883cc40f2d9513b58e4fc5380ab05b73791477e9c496f499ca7b35ecbe928d7cda69fda
-
SSDEEP
1536:Q2QVxKF03OXuK9s7/sEguuULsN3rhZurqODNrrQYey6iexQ1q2rTAmjq8cMGL:DYjyuKWgEgQIhCDnQY8nxQ1BrUSqVMM
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe -
Sets service image path in registry 2 TTPs 3 IoCs
Processes:
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\drmkaud\ImagePath = "Base" 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\drmkaud\ImagePath = "system32\\drmkaud.sys" 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\46C44B3E\ImagePath = "system32\\46C44B3E.sys" 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1968 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exeSvchost.exepid process 1940 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe 968 Svchost.exe -
Drops file in System32 directory 4 IoCs
Processes:
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exedescription ioc process File opened for modification C:\Windows\SysWOW64\282D0550.tmp 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe File opened for modification C:\Windows\SysWOW64\46C44B3E.sys 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe File opened for modification C:\Windows\SysWOW64\7A9C15B1.sys 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe -
Drops file in Windows directory 1 IoCs
Processes:
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exedescription ioc process File created C:\WINDOWS\KB2536276666.log 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exepid process 1940 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exedescription pid process Token: SeLoadDriverPrivilege 1940 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exedescription pid process target process PID 1940 wrote to memory of 1968 1940 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe cmd.exe PID 1940 wrote to memory of 1968 1940 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe cmd.exe PID 1940 wrote to memory of 1968 1940 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe cmd.exe PID 1940 wrote to memory of 1968 1940 07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe"C:\Users\Admin\AppData\Local\Temp\07a7daa188009040241d8ffcc0e9f760c30dae7599fbe12e7df755623d7a74d6.exe"1⤵
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7de07151.bat" "2⤵
- Deletes itself
PID:1968
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:1076
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD5fa132c11f675fd5f0eb2997d5bc4d731
SHA176239ca477b5c0b82eb968e66e45cb79b7ff52f1
SHA2560297daad1162f867e81d0591f31b1da7a151a2faa24f6b786948f99934f7753c
SHA512639c20e680e3a52e12193dc837b8de1e25c5cdf877009450d1a2e36e852a02da8bacf84fd25653d4a478b75b6ad439e86cfe6631a972decbe97d02536ffc02a2
-
Filesize
25KB
MD5622c4fc2bc6cbd965329dd0e2b5b24db
SHA10610310c0cc7e4005fdcf7d69b9810700efd7e19
SHA25611399043af5c2bd53b60e05c8e37fd3711d1086d5a0b658dd26ebd57498aacae
SHA512b43c4f5a593ff9bd8d9490d2d23c8fb9f4c5117532ac73ee3335a6f3ab8b2ce3ceb843418a0b2e5e69c13a5bb2a575502ff2ba56a1f49baeeecddfb029c81cf5
-
Filesize
97KB
MD529f006f8d94ee46b43a05a389e1f3542
SHA173dd0d83b50613cf9b047663d4e873497896757c
SHA256575e7be81c211b16af677ab42039a58c2c17370912531719414d120219f2fa9b
SHA51277196e6962d4374a455290bc4d3264aac34639c142ee9d3d30092de0169073173e8fc28614af01d631b1595ad4dea45450d8ff0aad47f1e180e35ac772623fd9
-
Filesize
25KB
MD5622c4fc2bc6cbd965329dd0e2b5b24db
SHA10610310c0cc7e4005fdcf7d69b9810700efd7e19
SHA25611399043af5c2bd53b60e05c8e37fd3711d1086d5a0b658dd26ebd57498aacae
SHA512b43c4f5a593ff9bd8d9490d2d23c8fb9f4c5117532ac73ee3335a6f3ab8b2ce3ceb843418a0b2e5e69c13a5bb2a575502ff2ba56a1f49baeeecddfb029c81cf5