Analysis
-
max time kernel
127s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe
Resource
win10v2004-20221111-en
General
-
Target
cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe
-
Size
797KB
-
MD5
25463ec11b0bbb41434e341f635ea57c
-
SHA1
bff9fb76cdf9a7ab99caa49f34a0a32a22f815f7
-
SHA256
cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908
-
SHA512
7c64ddcd1a581bb0df2daad1f8eb011939f549ec18ff86d41bac484ad9e4036be863c6d3053df8790d86369c7ea02d921e210fa4129a2a792c8111ef08c8c317
-
SSDEEP
12288:0i6URcrZOvslozQHf6OWRrrb6IGbHnfErt7ouN/eqpcNoYx2eh:o6OE+IGbyt794ht2eh
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exepid process 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\WinApp\\GoogleUpdate.exe.lnk" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exepid process 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exedescription pid process Token: SeDebugPrivilege 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.execmd.exedescription pid process target process PID 1416 wrote to memory of 680 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe cmd.exe PID 1416 wrote to memory of 680 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe cmd.exe PID 1416 wrote to memory of 680 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe cmd.exe PID 1416 wrote to memory of 680 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe cmd.exe PID 680 wrote to memory of 1708 680 cmd.exe reg.exe PID 680 wrote to memory of 1708 680 cmd.exe reg.exe PID 680 wrote to memory of 1708 680 cmd.exe reg.exe PID 680 wrote to memory of 1708 680 cmd.exe reg.exe PID 1416 wrote to memory of 960 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 960 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 960 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 960 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1788 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1788 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1788 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1788 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1312 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1312 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1312 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1312 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1472 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1472 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1472 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1472 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1068 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1068 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1068 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe PID 1416 wrote to memory of 1068 1416 cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe"C:\Users\Admin\AppData\Local\Temp\cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GoogleUpdate" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinApp\GoogleUpdate.exe.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "GoogleUpdate" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinApp\GoogleUpdate.exe.lnk"3⤵
- Adds Run key to start application
PID:1708 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:960
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1788
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1312
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1472
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
797KB
MD525463ec11b0bbb41434e341f635ea57c
SHA1bff9fb76cdf9a7ab99caa49f34a0a32a22f815f7
SHA256cdf8e50e8181aafe210944f84eaea8e54dc9024a09683292d66b4ec3314b9908
SHA5127c64ddcd1a581bb0df2daad1f8eb011939f549ec18ff86d41bac484ad9e4036be863c6d3053df8790d86369c7ea02d921e210fa4129a2a792c8111ef08c8c317