Analysis
-
max time kernel
118s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:46
Static task
static1
Behavioral task
behavioral1
Sample
bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe
Resource
win10v2004-20221111-en
General
-
Target
bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe
-
Size
716KB
-
MD5
4780b5422eb56929a826a8aea6345e72
-
SHA1
f7b562af913b9da29973e73a74cd290f7af3b987
-
SHA256
bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e
-
SHA512
37b5bc2fd69fc164832a2fd35d2e28d9e07eb2bfe60409485041e71740a8e51c4eff2d97563a91c311cf26893f228e35498ec434fd06b0526dc0b94efdc8fb24
-
SSDEEP
12288:wvw6ro+pQe1M2fr3fhFYGq6i0kaHKmJ/syPQHdqNyXovOi8kXg16J9KmxOnRE:crRQey2rXYyA78/svHsoqokXgAwoOO
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
dsa.exeserver.exeserver.exeCHANGE~1.EXEpid process 1488 dsa.exe 1964 server.exe 1016 server.exe 1396 CHANGE~1.EXE -
Loads dropped DLL 6 IoCs
Processes:
bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exedsa.exeserver.exepid process 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe 1488 dsa.exe 1488 dsa.exe 1964 server.exe 1488 dsa.exe 1488 dsa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dsa.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce dsa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dsa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
server.exepid process 1016 server.exe 1016 server.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exedsa.exeserver.exeserver.exedescription pid process Token: 33 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe Token: SeIncBasePriorityPrivilege 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe Token: 33 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe Token: SeIncBasePriorityPrivilege 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe Token: 33 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe Token: SeIncBasePriorityPrivilege 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe Token: 33 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe Token: SeIncBasePriorityPrivilege 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe Token: 33 1488 dsa.exe Token: SeIncBasePriorityPrivilege 1488 dsa.exe Token: 33 1964 server.exe Token: SeIncBasePriorityPrivilege 1964 server.exe Token: 33 1964 server.exe Token: SeIncBasePriorityPrivilege 1964 server.exe Token: 33 1016 server.exe Token: SeIncBasePriorityPrivilege 1016 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
CHANGE~1.EXEpid process 1396 CHANGE~1.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exedsa.exeserver.exeserver.exedescription pid process target process PID 1252 wrote to memory of 1488 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe dsa.exe PID 1252 wrote to memory of 1488 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe dsa.exe PID 1252 wrote to memory of 1488 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe dsa.exe PID 1252 wrote to memory of 1488 1252 bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe dsa.exe PID 1488 wrote to memory of 1964 1488 dsa.exe server.exe PID 1488 wrote to memory of 1964 1488 dsa.exe server.exe PID 1488 wrote to memory of 1964 1488 dsa.exe server.exe PID 1488 wrote to memory of 1964 1488 dsa.exe server.exe PID 1964 wrote to memory of 1016 1964 server.exe server.exe PID 1964 wrote to memory of 1016 1964 server.exe server.exe PID 1964 wrote to memory of 1016 1964 server.exe server.exe PID 1964 wrote to memory of 1016 1964 server.exe server.exe PID 1016 wrote to memory of 1208 1016 server.exe Explorer.EXE PID 1016 wrote to memory of 1208 1016 server.exe Explorer.EXE PID 1016 wrote to memory of 1208 1016 server.exe Explorer.EXE PID 1016 wrote to memory of 1208 1016 server.exe Explorer.EXE PID 1016 wrote to memory of 1208 1016 server.exe Explorer.EXE PID 1016 wrote to memory of 1208 1016 server.exe Explorer.EXE PID 1488 wrote to memory of 1396 1488 dsa.exe CHANGE~1.EXE PID 1488 wrote to memory of 1396 1488 dsa.exe CHANGE~1.EXE PID 1488 wrote to memory of 1396 1488 dsa.exe CHANGE~1.EXE PID 1488 wrote to memory of 1396 1488 dsa.exe CHANGE~1.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe"C:\Users\Admin\AppData\Local\Temp\bcebc8e9c4275fd189e87da6a180c0f9bf6f92b8f83bec87ed518a61aaa9433e.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.29\Virtual\STUBEXE\@APPDATALOCAL@\Temp\dsa.exe"C:\Users\Admin\AppData\Local\Temp\dsa.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.25\Virtual\STUBEXE\@APPDATALOCAL@\Temp\IXP000.TMP\server.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.29\Native\STUBEXE\@APPDATALOCAL@\Temp\IXP000.TMP\CHANGE~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHANGE~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c7851d971a65f2939d09af3b4469b7cd
SHA119def9f9208862e097e83cde7f6b2522a0f2c071
SHA256f66be3247726cc0724d4d29bf06a597b13cd65be2b40b7eec3c903cbff036f6b
SHA512bd598468bf73715d7363f67547abde6e1821f81b86f8565480354bfa896936835f9f4d616aa90189b7e067e84696bebc1f58809bae63f856b6b1f0f24d095fd1
-
Filesize
354KB
MD5a1f369f08734247b3159c3ede05bcae9
SHA186eaa06f7e12da258e30ce07d5b9a3e4772a4013
SHA25604cfbe0d4ab2a5b949e924368c3fe5d027abd0f8022e6124be2487511e371582
SHA512daae61df91b345e86ab7380179cfa26697c89427ec4fde50e02fb2bc7e3f5331f6fd79e3979a0240963e9a0303836c1ddc10604f5531e1ff870d02aacc2ebaa7
-
Filesize
354KB
MD5a1f369f08734247b3159c3ede05bcae9
SHA186eaa06f7e12da258e30ce07d5b9a3e4772a4013
SHA25604cfbe0d4ab2a5b949e924368c3fe5d027abd0f8022e6124be2487511e371582
SHA512daae61df91b345e86ab7380179cfa26697c89427ec4fde50e02fb2bc7e3f5331f6fd79e3979a0240963e9a0303836c1ddc10604f5531e1ff870d02aacc2ebaa7
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.25\Virtual\STUBEXE\@APPDATALOCAL@\Temp\IXP000.TMP\server.exe
Filesize17KB
MD54927ddbb60db41b4b6fe90540c5ae7bb
SHA13626a815c0c8039361baf12a6d4fc3a1d06676df
SHA256f17dcb91e79f9d879a66ad7ff536da5261f6d57af58fb455e903c2920d6fc018
SHA5125bf3cc72eb8cbe92f90ecc761ac59e14a30baa60f79343d3ce576155d6e490be09c92fe13c3567b813997a2c1e2354f3c0abbc500217590e0a422ca8b4fdb32c
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.29\Native\STUBEXE\@APPDATALOCAL@\Temp\IXP000.TMP\CHANGE~1.EXE
Filesize17KB
MD5043c51b5683e79d80cbdbfa00e9f77a4
SHA1ed18233e54ac7073613f8c334f2c1c3e18290461
SHA2564d60172a4ff72d67b9d1ced63901e6dd056984e802e9b169ab06fbeebc328c15
SHA512d98fa9211a191448249e179f2f19907f79cd4ef810cd0a0fcd689ec4f0fb716bd147aeecd9bd8bbf5ab121c754ba02312e8ffd7edda56956df12a31e41642c22
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.29\Virtual\STUBEXE\@APPDATALOCAL@\Temp\dsa.exe
Filesize17KB
MD560db249ebf401c2b49faafa08020b5a1
SHA19c8a72057137c369833e5cdd8b2bd78953743f17
SHA256bf453aa2049ab81cdba1f1de66b21b54d54e67e9502a40877239a217f0721ff1
SHA512945d5c5c33a3799c360c93bd9158c6fb78fc984621870fca451b9c28d304a149d119f47fd9d0e8ae3fff1c3ec556cb830cba67b949c51d4298d0e19530e9f0e5
-
Filesize
20KB
MD5c7851d971a65f2939d09af3b4469b7cd
SHA119def9f9208862e097e83cde7f6b2522a0f2c071
SHA256f66be3247726cc0724d4d29bf06a597b13cd65be2b40b7eec3c903cbff036f6b
SHA512bd598468bf73715d7363f67547abde6e1821f81b86f8565480354bfa896936835f9f4d616aa90189b7e067e84696bebc1f58809bae63f856b6b1f0f24d095fd1
-
Filesize
354KB
MD5a1f369f08734247b3159c3ede05bcae9
SHA186eaa06f7e12da258e30ce07d5b9a3e4772a4013
SHA25604cfbe0d4ab2a5b949e924368c3fe5d027abd0f8022e6124be2487511e371582
SHA512daae61df91b345e86ab7380179cfa26697c89427ec4fde50e02fb2bc7e3f5331f6fd79e3979a0240963e9a0303836c1ddc10604f5531e1ff870d02aacc2ebaa7
-
Filesize
354KB
MD5a1f369f08734247b3159c3ede05bcae9
SHA186eaa06f7e12da258e30ce07d5b9a3e4772a4013
SHA25604cfbe0d4ab2a5b949e924368c3fe5d027abd0f8022e6124be2487511e371582
SHA512daae61df91b345e86ab7380179cfa26697c89427ec4fde50e02fb2bc7e3f5331f6fd79e3979a0240963e9a0303836c1ddc10604f5531e1ff870d02aacc2ebaa7
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.25\Virtual\STUBEXE\@APPDATALOCAL@\Temp\IXP000.TMP\server.exe
Filesize17KB
MD54927ddbb60db41b4b6fe90540c5ae7bb
SHA13626a815c0c8039361baf12a6d4fc3a1d06676df
SHA256f17dcb91e79f9d879a66ad7ff536da5261f6d57af58fb455e903c2920d6fc018
SHA5125bf3cc72eb8cbe92f90ecc761ac59e14a30baa60f79343d3ce576155d6e490be09c92fe13c3567b813997a2c1e2354f3c0abbc500217590e0a422ca8b4fdb32c
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.29\Native\STUBEXE\@APPDATALOCAL@\Temp\IXP000.TMP\CHANGE~1.EXE
Filesize17KB
MD5043c51b5683e79d80cbdbfa00e9f77a4
SHA1ed18233e54ac7073613f8c334f2c1c3e18290461
SHA2564d60172a4ff72d67b9d1ced63901e6dd056984e802e9b169ab06fbeebc328c15
SHA512d98fa9211a191448249e179f2f19907f79cd4ef810cd0a0fcd689ec4f0fb716bd147aeecd9bd8bbf5ab121c754ba02312e8ffd7edda56956df12a31e41642c22
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1431.09.15T04.29\Virtual\STUBEXE\@APPDATALOCAL@\Temp\dsa.exe
Filesize17KB
MD560db249ebf401c2b49faafa08020b5a1
SHA19c8a72057137c369833e5cdd8b2bd78953743f17
SHA256bf453aa2049ab81cdba1f1de66b21b54d54e67e9502a40877239a217f0721ff1
SHA512945d5c5c33a3799c360c93bd9158c6fb78fc984621870fca451b9c28d304a149d119f47fd9d0e8ae3fff1c3ec556cb830cba67b949c51d4298d0e19530e9f0e5