Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe
Resource
win10v2004-20221111-en
General
-
Target
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe
-
Size
148KB
-
MD5
7455434b82cd0f6f81a648af92b8b267
-
SHA1
ecf82e5c9c565338477a2fe2ef9bff4eb43aa759
-
SHA256
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d
-
SHA512
7ce6c2754089614793923304e65b181d97b0432c318af7610f0e139533612f9fdaebe32ce7191957b70e17e95c8694ed55b168b6e5f62a620aa77db48e214de2
-
SSDEEP
3072:BGOtAUhje2WRjYaP9LUirtYEhfLYQe9nxKnp84b7UNO:IuDsRjNP9JpYwLWlxKPb7g
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Mozilla = "C:\\Users\\Admin\\AppData\\Roaming\\CDC467.exe" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
965.exepid process 1764 965.exe -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1884 svchost.exe -
Loads dropped DLL 1 IoCs
Processes:
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exepid process 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exedescription pid process target process PID 1720 set thread context of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exepid process 1880 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe 1880 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exee8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exedescription pid process target process PID 1720 wrote to memory of 1764 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe 965.exe PID 1720 wrote to memory of 1764 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe 965.exe PID 1720 wrote to memory of 1764 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe 965.exe PID 1720 wrote to memory of 1764 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe 965.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1720 wrote to memory of 1880 1720 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe PID 1880 wrote to memory of 1884 1880 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe svchost.exe PID 1880 wrote to memory of 1884 1880 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe svchost.exe PID 1880 wrote to memory of 1884 1880 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe svchost.exe PID 1880 wrote to memory of 1884 1880 e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe"C:\Users\Admin\AppData\Local\Temp\e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\965.exe"C:\Users\Admin\AppData\Local\Temp\965.exe"2⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe"C:\Users\Admin\AppData\Local\Temp\e8037bf64e996ce4aa43229067eb29f96f7cc096e6047c994ea524e6f5200d0d.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
- Deletes itself
PID:1884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5dbd14d0db0382dfe96d7b5007ddd5abe
SHA190f670e69a3af3025e4e69dd7753d885638c837c
SHA256788e9846912f38f0d5f0a88758aba80af788da40e96178635e6432cff0d87a37
SHA51279d66b29a9822f747c2dbfac8ddff27478ad690c59918a203ec8445215542114879e41481daeaf29e95ba25f128192ac3d2a231c89dff5d29de98070c41bb9f8
-
Filesize
63KB
MD5dbd14d0db0382dfe96d7b5007ddd5abe
SHA190f670e69a3af3025e4e69dd7753d885638c837c
SHA256788e9846912f38f0d5f0a88758aba80af788da40e96178635e6432cff0d87a37
SHA51279d66b29a9822f747c2dbfac8ddff27478ad690c59918a203ec8445215542114879e41481daeaf29e95ba25f128192ac3d2a231c89dff5d29de98070c41bb9f8