Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:46
Static task
static1
Behavioral task
behavioral1
Sample
8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe
Resource
win10v2004-20220901-en
General
-
Target
8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe
-
Size
358KB
-
MD5
2aaa67964b4e20b25ee2c8a124d1bc8e
-
SHA1
2c02c42d085d2b384d1d3d15a954606d9c157976
-
SHA256
8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3
-
SHA512
4db2e5b4bc8384b26177a665c5f4d3a2481e9f090bfad66a0803ec3a554831fc9ae919033c2a366a410a29503612451d75395a6ec157edc7eee2df053a4ed7b9
-
SSDEEP
6144:wXY1jqepIGuWZ+I2igbFdvywrZcZV7LjJoxGq6IE55wxg:wXY1jqe6Gj2hFdvyGcZ1FYGq61Gg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
server.exepid process 1764 server.exe -
Loads dropped DLL 1 IoCs
Processes:
8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exepid process 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
server.exepid process 1764 server.exe 1764 server.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exeserver.exedescription pid process Token: 33 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe Token: SeIncBasePriorityPrivilege 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe Token: 33 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe Token: SeIncBasePriorityPrivilege 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe Token: 33 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe Token: SeIncBasePriorityPrivilege 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe Token: 33 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe Token: SeIncBasePriorityPrivilege 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe Token: 33 1764 server.exe Token: SeIncBasePriorityPrivilege 1764 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exeserver.exedescription pid process target process PID 1220 wrote to memory of 1764 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe server.exe PID 1220 wrote to memory of 1764 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe server.exe PID 1220 wrote to memory of 1764 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe server.exe PID 1220 wrote to memory of 1764 1220 8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe server.exe PID 1764 wrote to memory of 1224 1764 server.exe Explorer.EXE PID 1764 wrote to memory of 1224 1764 server.exe Explorer.EXE PID 1764 wrote to memory of 1224 1764 server.exe Explorer.EXE PID 1764 wrote to memory of 1224 1764 server.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe"C:\Users\Admin\AppData\Local\Temp\8957f9e68f7d05522e9f0044931e184e0f919e2405924a945700d143eb010cc3.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1430.08.04T04.07\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1430.08.04T04.07\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe
Filesize17KB
MD54927ddbb60db41b4b6fe90540c5ae7bb
SHA13626a815c0c8039361baf12a6d4fc3a1d06676df
SHA256f17dcb91e79f9d879a66ad7ff536da5261f6d57af58fb455e903c2920d6fc018
SHA5125bf3cc72eb8cbe92f90ecc761ac59e14a30baa60f79343d3ce576155d6e490be09c92fe13c3567b813997a2c1e2354f3c0abbc500217590e0a422ca8b4fdb32c
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1430.08.04T04.07\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe
Filesize17KB
MD54927ddbb60db41b4b6fe90540c5ae7bb
SHA13626a815c0c8039361baf12a6d4fc3a1d06676df
SHA256f17dcb91e79f9d879a66ad7ff536da5261f6d57af58fb455e903c2920d6fc018
SHA5125bf3cc72eb8cbe92f90ecc761ac59e14a30baa60f79343d3ce576155d6e490be09c92fe13c3567b813997a2c1e2354f3c0abbc500217590e0a422ca8b4fdb32c