Analysis
-
max time kernel
170s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:41
Static task
static1
Behavioral task
behavioral1
Sample
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe
Resource
win10v2004-20220812-en
General
-
Target
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe
-
Size
85KB
-
MD5
3f731af7ec3d833439cc2dd9497b72ca
-
SHA1
5f6fd48d5096461a0b6d9e13a62bc8f0b7d39547
-
SHA256
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb
-
SHA512
2bc351bc9808d5fb094eb3a5c54318c935815bc8367c921f0b384052007141db40004e4b43995c4971a21cda1de0c17dcb5dfddd8a66871ac1e0b354d514626d
-
SSDEEP
1536:VGLyzqIfhbp1pG7eWLX1v8W84gYWmdmsnHm7ayzSY+4JdLzFDhRnP5F:VJWTGttmLHm7DSYfBzFDhRnD
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1436-55-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1436-57-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1436-58-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1436-63-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1436-64-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1436-65-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1436-66-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "c:\\users\\admin\\appdata\\local\\temp\\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe" 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exedescription pid process target process PID 844 set thread context of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exepid process 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exepid process 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 1436 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exedescription pid process target process PID 844 wrote to memory of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 844 wrote to memory of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 844 wrote to memory of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 844 wrote to memory of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 844 wrote to memory of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 844 wrote to memory of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 844 wrote to memory of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe PID 844 wrote to memory of 1436 844 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe 2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe"C:\Users\Admin\AppData\Local\Temp\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:844 -
\??\c:\users\admin\appdata\local\temp\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe"c:\users\admin\appdata\local\temp\2ced938f26db6b9cb2361079650b0c9eee9ff04de7cb918029d7ddfb2ef05deb.exe"2⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1436