Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:30
Static task
static1
Behavioral task
behavioral1
Sample
a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe
Resource
win10v2004-20220812-en
General
-
Target
a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe
-
Size
688KB
-
MD5
e47e2512aea2a641cf602eef14c49241
-
SHA1
2144adca01caa914b0f1baa881756afd2fb90681
-
SHA256
a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d
-
SHA512
0e3f9c99f8b4b7e3ed5db8ed69d4018bea0fcb76da851288739950cd43b8befc4df097953dddbf27e37702a66be9ef013bc33973d480081d51ed58a625ed6c37
-
SSDEEP
12288:oztjEp4VmvHUEGSIST8BrPoQeJYIsL+mxaCb:WkdaST6rLnLXB
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1908 cmd.exe -
Drops file in Windows directory 1 IoCs
Processes:
a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exedescription ioc process File created C:\WINDOWS\AlinpaySecSvc1.exe a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 8 IoCs
Processes:
a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Microsoft a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Microsoft\Windows a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Microsoft\Windows\CurrentVersion a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Software\Microsoft\Windows\CurrentVersion\Policies\System a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Software a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exepid process 1944 a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe 1944 a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.execmd.exedescription pid process target process PID 1944 wrote to memory of 1908 1944 a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe cmd.exe PID 1944 wrote to memory of 1908 1944 a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe cmd.exe PID 1944 wrote to memory of 1908 1944 a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe cmd.exe PID 1944 wrote to memory of 1908 1944 a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe cmd.exe PID 1908 wrote to memory of 1372 1908 cmd.exe WScript.exe PID 1908 wrote to memory of 1372 1908 cmd.exe WScript.exe PID 1908 wrote to memory of 1372 1908 cmd.exe WScript.exe PID 1908 wrote to memory of 1372 1908 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe"C:\Users\Admin\AppData\Local\Temp\a384cca4b1f23b5db3bf4af56687e8a25b187bf8196f0fc3a15d9c2f68e93d0d.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c c:\Del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\delay.vbs"3⤵PID:1372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18B
MD55ccc803b59fdbcdea8fd7510e8d0fc04
SHA1934485e70bf33c0860d346c92f85231be6dbc606
SHA25656dbbffa3c9452f514e5f85f589cd8ee557ddd79283c3456bb37296c482d4631
SHA512a0229aba0a6fda2f9edd6c363b5de5eae1da0f3e04b687ac893cc6f01cde7d969799333b576b0277363339906570ef33f30f5b3f6738cf16a5f49316fde9a642
-
Filesize
163B
MD54397f68e3a7f52972fda3616ffe342d1
SHA132128755e64655c37e4140619b103d10f7d5b282
SHA25695ba8eaad5334073c4f004a0efb0d09e93f95c737f1d05b9a6c9c69458ea8713
SHA512e4c142205193fcc97cc01cf230246d00effd60d6e98855ea5553d28c77a8a8c6c30d43f6879e7a7d08c4bd133ac7131c3797ffedc4025da19af6a32f6a16accd