Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:44
Behavioral task
behavioral1
Sample
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe
Resource
win10v2004-20221111-en
General
-
Target
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe
-
Size
756KB
-
MD5
ea6e9d8f151d1437cba55259bd7627fa
-
SHA1
a913d0af4e1c115ffdd1e05faa3df480e6cd2024
-
SHA256
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9
-
SHA512
4a795ddd4f2d0d0ffde973162a9b8636d2cb9bc7f921d59a72c100b27789c8f89fd746fb4a9c4bfaebc7148dafc2fef0998cc623af142b4f8bc000080232c2cf
-
SSDEEP
12288:09HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hx4:4Z1xuVVjfFoynPaVBUR8f+kN10EBc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Z71v3uLvbWMc\\/rat/rat" 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\system32\\Z71v3uLvbWMc\\/rat/rat" 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe -
Drops file in System32 directory 4 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Z71v3uLvbWMc\ 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe File created C:\Windows\SysWOW64\rat\rat 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe File created C:\Windows\SysWOW64\Z71v3uLvbWMc\rat\rat 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe File opened for modification C:\Windows\SysWOW64\Z71v3uLvbWMc\rat\rat 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exedescription pid process Token: SeIncreaseQuotaPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeSecurityPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeTakeOwnershipPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeLoadDriverPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeSystemProfilePrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeSystemtimePrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeProfSingleProcessPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeIncBasePriorityPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeCreatePagefilePrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeBackupPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeRestorePrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeShutdownPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeDebugPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeSystemEnvironmentPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeChangeNotifyPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeRemoteShutdownPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeUndockPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeManageVolumePrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeImpersonatePrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: SeCreateGlobalPrivilege 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: 33 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: 34 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe Token: 35 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exepid process 1696 1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe"C:\Users\Admin\AppData\Local\Temp\1beef4b921d7ab1808248a9a89f627385fd047c8b573104f74f0d17a2555a8c9.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1696