Analysis
-
max time kernel
174s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:24
Static task
static1
Behavioral task
behavioral1
Sample
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
Resource
win10v2004-20220812-en
General
-
Target
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
-
Size
60KB
-
MD5
be57bf494559581a52e67b35a994eee4
-
SHA1
8784613380e22a72cf9e8404cf2562a4b5b36f1e
-
SHA256
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102
-
SHA512
f6cbdacad846794a44449b0e858baf7a0befb5a7f8d47eba40474b9013955ade77d6080241cf18a899ad0e639f2badfd73f1402210a2706cd425d3ce5ff00a01
-
SSDEEP
1536:Q/GRyei2Bso+gU7aG57rZifwFODTnF/w12TFZ9jDSN:bi2Bs0U7ZZ0wFch/w12TzgN
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" .exe -
Executes dropped EXE 1 IoCs
Processes:
.exepid process 948 .exe -
Loads dropped DLL 2 IoCs
Processes:
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exepid process 1324 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe 1324 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ .exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\.exe" .exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
.exepid process 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe 948 .exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe.exepid process 1324 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe 948 .exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe.exedescription pid process target process PID 1324 wrote to memory of 948 1324 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe .exe PID 1324 wrote to memory of 948 1324 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe .exe PID 1324 wrote to memory of 948 1324 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe .exe PID 1324 wrote to memory of 948 1324 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe .exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe PID 948 wrote to memory of 1324 948 .exe 49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe"C:\Users\Admin\AppData\Local\Temp\49de3fbd139d6cf287e43392cc47687867c330d38cc6350567296d361c163102.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\.exe"C:\Users\Admin\.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5e84106ebe8e1da76cbc2432efa59fca0
SHA15c0e1dd594800a9f06751f166b7c15b087c808e0
SHA2562ca621e3e570bbe705538961d157af750b6ba77f0af167130b5cc832bb2acb0c
SHA512ed10ca83bd7f37680acb9c03786874041cce03add7b911f5ca7fd666fae7133d82ceb2befdd0188b2bb7379f4da5878ca575ef880de8c8e838412c0308dadb39
-
Filesize
60KB
MD5e84106ebe8e1da76cbc2432efa59fca0
SHA15c0e1dd594800a9f06751f166b7c15b087c808e0
SHA2562ca621e3e570bbe705538961d157af750b6ba77f0af167130b5cc832bb2acb0c
SHA512ed10ca83bd7f37680acb9c03786874041cce03add7b911f5ca7fd666fae7133d82ceb2befdd0188b2bb7379f4da5878ca575ef880de8c8e838412c0308dadb39
-
Filesize
60KB
MD5e84106ebe8e1da76cbc2432efa59fca0
SHA15c0e1dd594800a9f06751f166b7c15b087c808e0
SHA2562ca621e3e570bbe705538961d157af750b6ba77f0af167130b5cc832bb2acb0c
SHA512ed10ca83bd7f37680acb9c03786874041cce03add7b911f5ca7fd666fae7133d82ceb2befdd0188b2bb7379f4da5878ca575ef880de8c8e838412c0308dadb39
-
Filesize
60KB
MD5e84106ebe8e1da76cbc2432efa59fca0
SHA15c0e1dd594800a9f06751f166b7c15b087c808e0
SHA2562ca621e3e570bbe705538961d157af750b6ba77f0af167130b5cc832bb2acb0c
SHA512ed10ca83bd7f37680acb9c03786874041cce03add7b911f5ca7fd666fae7133d82ceb2befdd0188b2bb7379f4da5878ca575ef880de8c8e838412c0308dadb39