Analysis
-
max time kernel
144s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:51
Static task
static1
Behavioral task
behavioral1
Sample
6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe
Resource
win10v2004-20221111-en
General
-
Target
6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe
-
Size
2.4MB
-
MD5
335b591e290f9dea803db38e1f325bef
-
SHA1
6e02720b0b39e9ac7424bcb4697e1272cc391617
-
SHA256
6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168
-
SHA512
5b14b5a6530556b02dfdfaf5b8c5203d53cf7b71ab909032782a1485012aea9b11bfffdd447997010af7aca0412d2b9921ee20ed2556db0f5041288beae181b2
-
SSDEEP
49152:P41aYdE+D7tE/bSadhHmesfGSXiLHJ26EOe:PYJW+DC/bSayeUYve
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yjkpmzpy = "\"C:\\Users\\Admin\\AppData\\Roaming\\Mlbhiegj\\Yjkpmzpy.exe\"" 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exedescription pid process target process PID 1848 set thread context of 1836 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeMSBuild.exepid process 2028 powershell.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe 1836 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exe6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe Token: SeDebugPrivilege 1836 MSBuild.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.execmd.exedescription pid process target process PID 1848 wrote to memory of 856 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe cmd.exe PID 1848 wrote to memory of 856 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe cmd.exe PID 1848 wrote to memory of 856 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe cmd.exe PID 856 wrote to memory of 1308 856 cmd.exe PING.EXE PID 856 wrote to memory of 1308 856 cmd.exe PING.EXE PID 856 wrote to memory of 1308 856 cmd.exe PING.EXE PID 1848 wrote to memory of 2028 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe powershell.exe PID 1848 wrote to memory of 2028 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe powershell.exe PID 1848 wrote to memory of 2028 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe powershell.exe PID 1848 wrote to memory of 1836 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe MSBuild.exe PID 1848 wrote to memory of 1836 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe MSBuild.exe PID 1848 wrote to memory of 1836 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe MSBuild.exe PID 1848 wrote to memory of 1836 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe MSBuild.exe PID 1848 wrote to memory of 1836 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe MSBuild.exe PID 1848 wrote to memory of 1836 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe MSBuild.exe PID 1848 wrote to memory of 1836 1848 6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe"C:\Users\Admin\AppData\Local\Temp\6c5a4429b32795b89ea0bed4af115cd5edb9c3d7c1832aab72f73c691b122168.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping google.com2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\system32\PING.EXEping google.com3⤵
- Runs ping.exe
PID:1308 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836