Analysis
-
max time kernel
21s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:09
Static task
static1
Behavioral task
behavioral1
Sample
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe
Resource
win10v2004-20221111-en
General
-
Target
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe
-
Size
116KB
-
MD5
7fdf1177ae26859ce367d4cd76a712d1
-
SHA1
3410dbe2e502ccd791b05bb919bc2814d1275bca
-
SHA256
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
-
SHA512
a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c
-
SSDEEP
3072:gtuA/sk2uoYzVzSeQ7fFcO73V+cQhkv3NhF:gtTogSztD738cQhQ9hF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
SdTr.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\SdTr.exe" SdTr.exe -
Executes dropped EXE 2 IoCs
Processes:
SdTr.exeSdTr.exepid process 1368 SdTr.exe 1748 SdTr.exe -
Loads dropped DLL 2 IoCs
Processes:
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exepid process 1852 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe 1852 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SdTr.exedescription pid process target process PID 1368 set thread context of 1748 1368 SdTr.exe SdTr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exeSdTr.exepid process 1852 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe 1368 SdTr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exeSdTr.exedescription pid process target process PID 1852 wrote to memory of 1368 1852 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe SdTr.exe PID 1852 wrote to memory of 1368 1852 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe SdTr.exe PID 1852 wrote to memory of 1368 1852 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe SdTr.exe PID 1852 wrote to memory of 1368 1852 25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe PID 1368 wrote to memory of 1748 1368 SdTr.exe SdTr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe"C:\Users\Admin\AppData\Local\Temp\25235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Roaming\SdTr.exe"C:\Users\Admin\AppData\Roaming\SdTr.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Roaming\SdTr.exe"C:\Users\Admin\AppData\Roaming\SdTr.exe"3⤵
- Executes dropped EXE
PID:1748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD57fdf1177ae26859ce367d4cd76a712d1
SHA13410dbe2e502ccd791b05bb919bc2814d1275bca
SHA25625235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
SHA512a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c
-
Filesize
116KB
MD57fdf1177ae26859ce367d4cd76a712d1
SHA13410dbe2e502ccd791b05bb919bc2814d1275bca
SHA25625235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
SHA512a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c
-
Filesize
116KB
MD57fdf1177ae26859ce367d4cd76a712d1
SHA13410dbe2e502ccd791b05bb919bc2814d1275bca
SHA25625235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
SHA512a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c
-
Filesize
116KB
MD57fdf1177ae26859ce367d4cd76a712d1
SHA13410dbe2e502ccd791b05bb919bc2814d1275bca
SHA25625235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
SHA512a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c
-
Filesize
116KB
MD57fdf1177ae26859ce367d4cd76a712d1
SHA13410dbe2e502ccd791b05bb919bc2814d1275bca
SHA25625235495fd6c467c26f70e23514035d884fa169cb7a0a4d60548364f7718aa8a
SHA512a4ea6c2dcc05e72ec62b4c8c98b9560e1608e447cb36cb7e6a15cf7a36044bae3cbaea6f7daac56ee8f757e1e08c98ccc8f5fb9fb7d6431f38d2c3c7c361a88c