Analysis
-
max time kernel
58s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:57
Static task
static1
Behavioral task
behavioral1
Sample
a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe
Resource
win10v2004-20220812-en
General
-
Target
a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe
-
Size
644KB
-
MD5
43a74b2339f24d3ab63a48c6dfb9edd1
-
SHA1
661a4e4a1f17fce80be658e27030c0d00949d2c5
-
SHA256
a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3
-
SHA512
211deda0edf6a981dc475406ce2ffeb53f40800834c3faed359715e07f9eb405a5d6f1684ea73274f52af25e2a5c45ad1747e8caed8d38e350e1982e49ed971c
-
SSDEEP
12288:7c//////WwT6zphI6FQUuU6W/unAi+KkZdbxMMeVMgrQzM+i3byjaO1:7c//////TT6Fh1+U0nudbxpeVMGxul1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchos.exeÂÌÉ«.exepid process 1892 svchos.exe 2032 ÂÌÉ«.exe -
Loads dropped DLL 5 IoCs
Processes:
cmd.execmd.exeÂÌÉ«.exepid process 1712 cmd.exe 940 cmd.exe 940 cmd.exe 1712 cmd.exe 2032 ÂÌÉ«.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
svchos.exeÂÌÉ«.exepid process 1892 svchos.exe 2032 ÂÌÉ«.exe 2032 ÂÌÉ«.exe 1892 svchos.exe 2032 ÂÌÉ«.exe 2032 ÂÌÉ«.exe 2032 ÂÌÉ«.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.execmd.execmd.exedescription pid process target process PID 1452 wrote to memory of 1712 1452 a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe cmd.exe PID 1452 wrote to memory of 1712 1452 a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe cmd.exe PID 1452 wrote to memory of 1712 1452 a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe cmd.exe PID 1452 wrote to memory of 1712 1452 a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe cmd.exe PID 1452 wrote to memory of 940 1452 a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe cmd.exe PID 1452 wrote to memory of 940 1452 a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe cmd.exe PID 1452 wrote to memory of 940 1452 a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe cmd.exe PID 1452 wrote to memory of 940 1452 a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe cmd.exe PID 940 wrote to memory of 2032 940 cmd.exe ÂÌÉ«.exe PID 940 wrote to memory of 2032 940 cmd.exe ÂÌÉ«.exe PID 940 wrote to memory of 2032 940 cmd.exe ÂÌÉ«.exe PID 940 wrote to memory of 2032 940 cmd.exe ÂÌÉ«.exe PID 1712 wrote to memory of 1892 1712 cmd.exe svchos.exe PID 1712 wrote to memory of 1892 1712 cmd.exe svchos.exe PID 1712 wrote to memory of 1892 1712 cmd.exe svchos.exe PID 1712 wrote to memory of 1892 1712 cmd.exe svchos.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe"C:\Users\Admin\AppData\Local\Temp\a390ee271b70b2994551f070aa40ffc6a0463fb52c3111b5170a6ab50dbca3f3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\svchos.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\svchos.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ÂÌÉ«.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\ÂÌÉ«.exeC:\Users\Admin\AppData\Local\Temp\ÂÌÉ«.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD5c53707cf8e3d2e42776df41a5fac3bf8
SHA16a29759f93c32f8138c8a0989094f7cfc1df7b11
SHA256d3f639f39d612adefb2dcef15f8821de97b5556064cec77a3e6d7f3abeee7c4a
SHA512dc053aba8ce185d6315887ec8adf6eeb505e6e847cd94bf4b73d486cf924760830e8d48b9a4e520a75def24a0343a6ed6c4980e7497223d20875b11f2afa7520
-
Filesize
52KB
MD5c53707cf8e3d2e42776df41a5fac3bf8
SHA16a29759f93c32f8138c8a0989094f7cfc1df7b11
SHA256d3f639f39d612adefb2dcef15f8821de97b5556064cec77a3e6d7f3abeee7c4a
SHA512dc053aba8ce185d6315887ec8adf6eeb505e6e847cd94bf4b73d486cf924760830e8d48b9a4e520a75def24a0343a6ed6c4980e7497223d20875b11f2afa7520
-
Filesize
547KB
MD5156fd0bfa8e34c9631a8a9d7c8a366d6
SHA1e75e6027f10f092bde3ebbc6d99cc734cfdcdf86
SHA256839e2eff174c25d897c9611ea04990f3e083a02f26b65bc1548dcd0926f5c9b6
SHA5126af4a66da22c09806f42594f8d89ec2397d0d5ab94b8cfd67b6dc9769ba7332e3505f2e7b896a85ead50b6876292363dc06790d1e6cccf38ac995b3e3fd775da
-
Filesize
547KB
MD5156fd0bfa8e34c9631a8a9d7c8a366d6
SHA1e75e6027f10f092bde3ebbc6d99cc734cfdcdf86
SHA256839e2eff174c25d897c9611ea04990f3e083a02f26b65bc1548dcd0926f5c9b6
SHA5126af4a66da22c09806f42594f8d89ec2397d0d5ab94b8cfd67b6dc9769ba7332e3505f2e7b896a85ead50b6876292363dc06790d1e6cccf38ac995b3e3fd775da
-
Filesize
1.0MB
MD5dde0681ba7a02bbb1c9b756af7e53fd2
SHA1eb1310a5848614d89e71e76bf6beee497a068017
SHA256f1efcaa3a7b5bf98819ec0076984f4af595d595c2553f4eec454e6d96f2bf080
SHA5121f9892ea5727159e7f0ec836dac78bd6923f7b803e5f39113a14c27b4bea5353503a7b998088cdf8ad0f0920e66a241c588bec0b2cab6b02157b54ab4ce30ff1
-
Filesize
52KB
MD5c53707cf8e3d2e42776df41a5fac3bf8
SHA16a29759f93c32f8138c8a0989094f7cfc1df7b11
SHA256d3f639f39d612adefb2dcef15f8821de97b5556064cec77a3e6d7f3abeee7c4a
SHA512dc053aba8ce185d6315887ec8adf6eeb505e6e847cd94bf4b73d486cf924760830e8d48b9a4e520a75def24a0343a6ed6c4980e7497223d20875b11f2afa7520
-
Filesize
52KB
MD5c53707cf8e3d2e42776df41a5fac3bf8
SHA16a29759f93c32f8138c8a0989094f7cfc1df7b11
SHA256d3f639f39d612adefb2dcef15f8821de97b5556064cec77a3e6d7f3abeee7c4a
SHA512dc053aba8ce185d6315887ec8adf6eeb505e6e847cd94bf4b73d486cf924760830e8d48b9a4e520a75def24a0343a6ed6c4980e7497223d20875b11f2afa7520
-
Filesize
547KB
MD5156fd0bfa8e34c9631a8a9d7c8a366d6
SHA1e75e6027f10f092bde3ebbc6d99cc734cfdcdf86
SHA256839e2eff174c25d897c9611ea04990f3e083a02f26b65bc1548dcd0926f5c9b6
SHA5126af4a66da22c09806f42594f8d89ec2397d0d5ab94b8cfd67b6dc9769ba7332e3505f2e7b896a85ead50b6876292363dc06790d1e6cccf38ac995b3e3fd775da
-
Filesize
547KB
MD5156fd0bfa8e34c9631a8a9d7c8a366d6
SHA1e75e6027f10f092bde3ebbc6d99cc734cfdcdf86
SHA256839e2eff174c25d897c9611ea04990f3e083a02f26b65bc1548dcd0926f5c9b6
SHA5126af4a66da22c09806f42594f8d89ec2397d0d5ab94b8cfd67b6dc9769ba7332e3505f2e7b896a85ead50b6876292363dc06790d1e6cccf38ac995b3e3fd775da