Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:58
Static task
static1
Behavioral task
behavioral1
Sample
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe
Resource
win10v2004-20220901-en
General
-
Target
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe
-
Size
397KB
-
MD5
f3aef02210475782657d7a7f222c8526
-
SHA1
382a626c3861dc917eccc62bbae9afbd24da4463
-
SHA256
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360
-
SHA512
e3fe3e92f5ca375987c693cbb2f9ffc664fddf0c5932efe06982ca3cc0d7ff15745d45a7148f6a01c3c77ac4d451b75b36a2ede5d3215a1a1845e39bff224691
-
SSDEEP
12288:riBbj0vw18IG5SJDGMOtNixEpNDtyT+kJT:2Bd1Q0BGMOzimpCiQ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogontm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Default Folder\\Default File.exe" a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exedescription pid process target process PID 2036 set thread context of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exepid process 892 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exedescription pid process Token: SeDebugPrivilege 892 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe Token: SeDebugPrivilege 892 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exepid process 892 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exedescription pid process target process PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe PID 2036 wrote to memory of 892 2036 a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe"C:\Users\Admin\AppData\Local\Temp\a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe"C:\Users\Admin\AppData\Local\Temp\a3f677854bb917665d8510182ad7d8fbb1c24415cbe86ac0ab62199eb5fa7360.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/892-55-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/892-56-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/892-58-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/892-60-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/892-62-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/892-64-0x00000000004452BE-mapping.dmp
-
memory/892-66-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/892-68-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/892-71-0x00000000745A0000-0x0000000074B4B000-memory.dmpFilesize
5.7MB
-
memory/892-72-0x00000000745A0000-0x0000000074B4B000-memory.dmpFilesize
5.7MB
-
memory/2036-54-0x0000000075521000-0x0000000075523000-memory.dmpFilesize
8KB
-
memory/2036-70-0x00000000745A0000-0x0000000074B4B000-memory.dmpFilesize
5.7MB