Analysis
-
max time kernel
64s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:11
Behavioral task
behavioral1
Sample
5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe
Resource
win10v2004-20220901-en
General
-
Target
5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe
-
Size
40KB
-
MD5
21d84c36f184858f92b07e4724e6c572
-
SHA1
cf2dec22a900a54f180322d4a34986092e7f1cbf
-
SHA256
5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd
-
SHA512
1d3e59129047dc06f36135e081fe940c90ac3fe4876ec8193f83b0cb059a4a73392e22a8cae0b3a045300d89762deba247777acef6770e68b083d5eca2273b20
-
SSDEEP
768:QVdWemzlLOPoUdCgDj+/1x1FSLDLRUNQNIwewoFMQQJj7gKn:+dGFO0yj+/bODLRHQMQsj7g
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/872-54-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 628 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\WINSXS32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe" 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exedescription pid process target process PID 872 set thread context of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exedescription pid process target process PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 872 wrote to memory of 672 872 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe PID 672 wrote to memory of 628 672 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe cmd.exe PID 672 wrote to memory of 628 672 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe cmd.exe PID 672 wrote to memory of 628 672 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe cmd.exe PID 672 wrote to memory of 628 672 5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe"C:\Users\Admin\AppData\Local\Temp\5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe"C:\Users\Admin\AppData\Local\Temp\5e915727ef2f2087839f8c013fe8b85be8dc0668d5d51d465c9d864a50d0e4cd.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UNIDD7.tmp.bat" "3⤵
- Deletes itself
PID:628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324B
MD5f73026bc8d208ece687f4409d59dd0da
SHA119f18abfa1f0b3935e99d6b23e55674c96e853a6
SHA256425fd6b9997512c4c1d40dba9fe97d47ca4bfa00eb11cc926d3ceb2ac741e212
SHA51294cd28c01a46aa207f7859052a88154d55a709fd13aebd468bce5ca83fb238687c27c5ab84130f7318c48bbed0f2ecbb96fa0a0278431b07e4b9210d3fa3fa1a