Analysis
-
max time kernel
171s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:50
Static task
static1
Behavioral task
behavioral1
Sample
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe
Resource
win10v2004-20221111-en
General
-
Target
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe
-
Size
22KB
-
MD5
51a1affc3405359fdd6b2caa9ad6b760
-
SHA1
26a1398fb4a34f12ce7280e182045b1ea201cef2
-
SHA256
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402
-
SHA512
db7f8374edfa72aa6dc445df57965e7d44c3f90adde1f96436f66abeca569af051e3677c3392a68392cb1149f65ec2a7336ffc674a5e5a7fdbfc82ee1d334f44
-
SSDEEP
384:Piv9NM67LuJP7xaQ0xh5K+BrIyucYetD++xh1iyzknYjc5SamYhNcngkiM:P0fMrL0xhNBBYetDxhY1Yjcw3vngu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1816 taskkill.exe -
Modifies registry class 11 IoCs
Processes:
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\ = "????" 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open\command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE " 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.IE 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.IE\ = "IE" 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IE\NeverShowExt = "1" 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IE\shell\open 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exepid process 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exetaskkill.exedescription pid process Token: SeDebugPrivilege 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Token: SeDebugPrivilege 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Token: SeDebugPrivilege 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe Token: SeDebugPrivilege 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exepid process 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.execmd.exedescription pid process target process PID 4456 wrote to memory of 1816 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe taskkill.exe PID 4456 wrote to memory of 1816 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe taskkill.exe PID 4456 wrote to memory of 1816 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe taskkill.exe PID 4456 wrote to memory of 5080 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe cmd.exe PID 4456 wrote to memory of 5080 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe cmd.exe PID 4456 wrote to memory of 5080 4456 12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe cmd.exe PID 5080 wrote to memory of 216 5080 cmd.exe PING.EXE PID 5080 wrote to memory of 216 5080 cmd.exe PING.EXE PID 5080 wrote to memory of 216 5080 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe"C:\Users\Admin\AppData\Local\Temp\12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ZhuDongFangyu.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 1 && del "C:\Users\Admin\AppData\Local\Temp\12277eb7b04f06740fe7c37e2385ccf6909712f5891e75fc98fcbd15016e7402.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:216