Analysis
-
max time kernel
147s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe
Resource
win10v2004-20221111-en
General
-
Target
61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe
-
Size
607KB
-
MD5
3c2ff7ca092e5f85a643718b4b8fd8d5
-
SHA1
665bd7cc6ee476d016a23d98c21d8d34d0e7c865
-
SHA256
61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417
-
SHA512
5d48e9c8be4e0d76c52ec58a58968256f8356ec7c9082e178bfec5502e007037642295585e21830c42bca2c9845e61225030fd116d9231c4e446ba6fb10b27d8
-
SSDEEP
6144:Zomzg7QVd7KZMuczJeeo0xdeeS+vtVZzNsYEwyVilDN89tEbfM0p9HajmFZDor96:vzgkVdKZKZ1Q6oYgilD4XOH9Dm9po
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost\\svchost.exe,explorer.exe" reg.exe -
Executes dropped EXE 1 IoCs
pid Process 1376 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe -
Loads dropped DLL 2 IoCs
pid Process 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1340 set thread context of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe Token: SeDebugPrivilege 1376 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1376 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1716 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 28 PID 1340 wrote to memory of 1716 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 28 PID 1340 wrote to memory of 1716 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 28 PID 1340 wrote to memory of 1716 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 28 PID 1716 wrote to memory of 1408 1716 cmd.exe 30 PID 1716 wrote to memory of 1408 1716 cmd.exe 30 PID 1716 wrote to memory of 1408 1716 cmd.exe 30 PID 1716 wrote to memory of 1408 1716 cmd.exe 30 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31 PID 1340 wrote to memory of 1376 1340 61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe"C:\Users\Admin\AppData\Local\Temp\61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost\svchost.exe,explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost\svchost.exe,explorer.exe"3⤵
- Modifies WinLogon for persistence
PID:1408
-
-
-
C:\Users\Admin\AppData\Local\Temp\61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe"C:\Users\Admin\AppData\Local\Temp\61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe
Filesize607KB
MD53c2ff7ca092e5f85a643718b4b8fd8d5
SHA1665bd7cc6ee476d016a23d98c21d8d34d0e7c865
SHA25661a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417
SHA5125d48e9c8be4e0d76c52ec58a58968256f8356ec7c9082e178bfec5502e007037642295585e21830c42bca2c9845e61225030fd116d9231c4e446ba6fb10b27d8
-
\Users\Admin\AppData\Local\Temp\61a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417.exe
Filesize607KB
MD53c2ff7ca092e5f85a643718b4b8fd8d5
SHA1665bd7cc6ee476d016a23d98c21d8d34d0e7c865
SHA25661a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417
SHA5125d48e9c8be4e0d76c52ec58a58968256f8356ec7c9082e178bfec5502e007037642295585e21830c42bca2c9845e61225030fd116d9231c4e446ba6fb10b27d8
-
Filesize
607KB
MD53c2ff7ca092e5f85a643718b4b8fd8d5
SHA1665bd7cc6ee476d016a23d98c21d8d34d0e7c865
SHA25661a809335489e741abe00dc2a164106eb6b543413473645dd2461501ab1e7417
SHA5125d48e9c8be4e0d76c52ec58a58968256f8356ec7c9082e178bfec5502e007037642295585e21830c42bca2c9845e61225030fd116d9231c4e446ba6fb10b27d8