Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:27
Static task
static1
Behavioral task
behavioral1
Sample
45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe
Resource
win10v2004-20221111-en
General
-
Target
45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe
-
Size
350KB
-
MD5
1c1f2e563c790f7701a575288ae0d573
-
SHA1
e9c4416861831cca3caaa97afa7d381175fa7799
-
SHA256
45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968
-
SHA512
74c1d4e82a315b812261878a0d7178a5ada950e04026f1446d356afd8378f25f8fcbcdb8cef012985e68d0f00653c97c4d5cdb086d437d9a7e2aba7123e4b5fb
-
SSDEEP
6144:Lt4al8Af5qIFH5oujLgjxWTrv+jLUXlNlVT5ErYzHE84Wq8VBEJAqY420gkGcXEQ:6a9qI1WuIGrv+SlVTSox4X8XEJee
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 736 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe -
Deletes itself 1 IoCs
pid Process 1744 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Deffense = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Deffense\\windef.exe" 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Deffense = "\\Windows Deffense\\windef.exe" 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1808 set thread context of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1768 set thread context of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1064 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe Token: SeDebugPrivilege 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe Token: SeDebugPrivilege 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe Token: SeDebugPrivilege 736 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe Token: SeDebugPrivilege 736 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 736 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 1808 wrote to memory of 2036 1808 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 27 PID 2036 wrote to memory of 1768 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 28 PID 2036 wrote to memory of 1768 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 28 PID 2036 wrote to memory of 1768 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 28 PID 2036 wrote to memory of 1768 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 28 PID 2036 wrote to memory of 1744 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 29 PID 2036 wrote to memory of 1744 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 29 PID 2036 wrote to memory of 1744 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 29 PID 2036 wrote to memory of 1744 2036 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 29 PID 1744 wrote to memory of 1064 1744 cmd.exe 31 PID 1744 wrote to memory of 1064 1744 cmd.exe 31 PID 1744 wrote to memory of 1064 1744 cmd.exe 31 PID 1744 wrote to memory of 1064 1744 cmd.exe 31 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32 PID 1768 wrote to memory of 736 1768 45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:1064
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe
Filesize350KB
MD51c1f2e563c790f7701a575288ae0d573
SHA1e9c4416861831cca3caaa97afa7d381175fa7799
SHA25645a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968
SHA51274c1d4e82a315b812261878a0d7178a5ada950e04026f1446d356afd8378f25f8fcbcdb8cef012985e68d0f00653c97c4d5cdb086d437d9a7e2aba7123e4b5fb
-
C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe
Filesize350KB
MD51c1f2e563c790f7701a575288ae0d573
SHA1e9c4416861831cca3caaa97afa7d381175fa7799
SHA25645a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968
SHA51274c1d4e82a315b812261878a0d7178a5ada950e04026f1446d356afd8378f25f8fcbcdb8cef012985e68d0f00653c97c4d5cdb086d437d9a7e2aba7123e4b5fb
-
C:\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe
Filesize350KB
MD51c1f2e563c790f7701a575288ae0d573
SHA1e9c4416861831cca3caaa97afa7d381175fa7799
SHA25645a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968
SHA51274c1d4e82a315b812261878a0d7178a5ada950e04026f1446d356afd8378f25f8fcbcdb8cef012985e68d0f00653c97c4d5cdb086d437d9a7e2aba7123e4b5fb
-
\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe
Filesize350KB
MD51c1f2e563c790f7701a575288ae0d573
SHA1e9c4416861831cca3caaa97afa7d381175fa7799
SHA25645a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968
SHA51274c1d4e82a315b812261878a0d7178a5ada950e04026f1446d356afd8378f25f8fcbcdb8cef012985e68d0f00653c97c4d5cdb086d437d9a7e2aba7123e4b5fb
-
\Users\Admin\AppData\Local\Temp\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968\45a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968.exe
Filesize350KB
MD51c1f2e563c790f7701a575288ae0d573
SHA1e9c4416861831cca3caaa97afa7d381175fa7799
SHA25645a8ef08b92d039383b8aef94ac424d87a4e96dee5ec8d949dbc428ab40ad968
SHA51274c1d4e82a315b812261878a0d7178a5ada950e04026f1446d356afd8378f25f8fcbcdb8cef012985e68d0f00653c97c4d5cdb086d437d9a7e2aba7123e4b5fb