Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:39
Static task
static1
Behavioral task
behavioral1
Sample
a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe
Resource
win10v2004-20220901-en
General
-
Target
a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe
-
Size
1.3MB
-
MD5
cb90a2e16248a527f6cc7205ed3624bf
-
SHA1
9499e4d7c56caf13dc1c659d0d21f74ebca57225
-
SHA256
a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac
-
SHA512
afada5ed5f801d350a75fbd5e178ffb805e32b4688107ab04e88c65e84e61fdaae56d60a23e0726afa443fae2efc6f39cd93479788a661a596ce207f14118e2f
-
SSDEEP
24576:UhQMSJvM7f824i1mRsWLP9wKn9gNg19rjgtB:m/xssWDaIamlgtB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Roamingflash_player_plugin.exepid process 992 Roamingflash_player_plugin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exepid process 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exedescription pid process Token: SeDebugPrivilege 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Roamingflash_player_plugin.exepid process 992 Roamingflash_player_plugin.exe 992 Roamingflash_player_plugin.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exedescription pid process target process PID 1676 wrote to memory of 992 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe Roamingflash_player_plugin.exe PID 1676 wrote to memory of 992 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe Roamingflash_player_plugin.exe PID 1676 wrote to memory of 992 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe Roamingflash_player_plugin.exe PID 1676 wrote to memory of 992 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe Roamingflash_player_plugin.exe PID 1676 wrote to memory of 992 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe Roamingflash_player_plugin.exe PID 1676 wrote to memory of 992 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe Roamingflash_player_plugin.exe PID 1676 wrote to memory of 992 1676 a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe Roamingflash_player_plugin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe"C:\Users\Admin\AppData\Local\Temp\a37b876975b6a67c69cbf73b74bad8f209ce27a446cde8c25dfa6c57bd46f5ac.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roamingflash_player_plugin.exe"C:\Users\Admin\AppData\Roamingflash_player_plugin.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roamingflash_player_plugin.exeFilesize
1.0MB
MD505bd5ac2baf0abbce24deb916d0fb79c
SHA17070263d9c43c80b1b1f997268be72926cc0dc98
SHA256f9f2e632535b214a0fab376b32cbee1cab6507490c22ba9e12cfa417ed8d72bb
SHA51268837d7e5ccb97ec412c851660752f2aa45af5e4b0e09adcbea05aa3f95330813575c2e5c1c1b683820967e410725d120939b7498e578362f3c5a722655c5964
-
C:\Users\Admin\AppData\Roamingflash_player_plugin.exeFilesize
1.0MB
MD505bd5ac2baf0abbce24deb916d0fb79c
SHA17070263d9c43c80b1b1f997268be72926cc0dc98
SHA256f9f2e632535b214a0fab376b32cbee1cab6507490c22ba9e12cfa417ed8d72bb
SHA51268837d7e5ccb97ec412c851660752f2aa45af5e4b0e09adcbea05aa3f95330813575c2e5c1c1b683820967e410725d120939b7498e578362f3c5a722655c5964
-
memory/992-57-0x0000000000000000-mapping.dmp
-
memory/992-59-0x0000000075E31000-0x0000000075E33000-memory.dmpFilesize
8KB
-
memory/992-62-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/992-63-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/992-64-0x0000000000400000-0x00000000004B4000-memory.dmpFilesize
720KB
-
memory/1676-54-0x000007FEF4E60000-0x000007FEF5883000-memory.dmpFilesize
10.1MB
-
memory/1676-55-0x000007FEF3B80000-0x000007FEF4C16000-memory.dmpFilesize
16.6MB
-
memory/1676-56-0x0000000000B86000-0x0000000000BA5000-memory.dmpFilesize
124KB
-
memory/1676-60-0x0000000000B86000-0x0000000000BA5000-memory.dmpFilesize
124KB