Analysis
-
max time kernel
168s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe
Resource
win10v2004-20220812-en
General
-
Target
7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe
-
Size
1.2MB
-
MD5
956972e02044d5255ba631548fab1415
-
SHA1
589ba5d773b4eb338f62e5839838f4f15cae5255
-
SHA256
7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77
-
SHA512
5aa928d14c01462d68a35cf45643d0364b336379dff15c5867a33dab0bea04481f6d848e5553dc872fb6e20a51e2e3e2c4a6a4fe37a470c72686959d0a3fac19
-
SSDEEP
12288:8GKvjzGASyZ6OENzf8s+y0EMc/4mxooBxXXlDKGKvjzGASyZ6OENzf8s+y0EMc/8:NJZTJZe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
TTravelerx.exepid process 1484 TTravelerx.exe -
Drops startup file 2 IoCs
Processes:
7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TTravelerx.exe 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TTravelerx.exe 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe -
Loads dropped DLL 2 IoCs
Processes:
7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exepid process 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1912 taskkill.exe 1172 taskkill.exe -
Processes:
TTravelerx.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main TTravelerx.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch TTravelerx.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" TTravelerx.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
taskkill.exetaskkill.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 1172 taskkill.exe Token: SeDebugPrivilege 1912 taskkill.exe Token: 33 1744 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1744 AUDIODG.EXE Token: 33 1744 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1744 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 1832 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exeTTravelerx.exepid process 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe 1484 TTravelerx.exe 1484 TTravelerx.exe 1484 TTravelerx.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exeTTravelerx.exedescription pid process target process PID 844 wrote to memory of 1912 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe taskkill.exe PID 844 wrote to memory of 1912 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe taskkill.exe PID 844 wrote to memory of 1912 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe taskkill.exe PID 844 wrote to memory of 1912 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe taskkill.exe PID 844 wrote to memory of 324 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe cmd.exe PID 844 wrote to memory of 324 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe cmd.exe PID 844 wrote to memory of 324 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe cmd.exe PID 844 wrote to memory of 324 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe cmd.exe PID 844 wrote to memory of 1484 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe TTravelerx.exe PID 844 wrote to memory of 1484 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe TTravelerx.exe PID 844 wrote to memory of 1484 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe TTravelerx.exe PID 844 wrote to memory of 1484 844 7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe TTravelerx.exe PID 1484 wrote to memory of 1172 1484 TTravelerx.exe taskkill.exe PID 1484 wrote to memory of 1172 1484 TTravelerx.exe taskkill.exe PID 1484 wrote to memory of 1172 1484 TTravelerx.exe taskkill.exe PID 1484 wrote to memory of 1172 1484 TTravelerx.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe"C:\Users\Admin\AppData\Local\Temp\7037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im TTraveler.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Icon_1.ico2⤵PID:324
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TTravelerx.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TTravelerx.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im TTraveler.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1832
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2ec1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5fc8c30c440f338815f5fa813392a7e5d
SHA15bfebf7d4e4e59b88bbc3674169910350a718962
SHA256d4d3be8ecf145f4e02d8e6f1f7b72688ee11ccc6d5bd626e1fe61e5a71c0e20a
SHA5125db8657478b664066f0870623fffe9f0640bd7aeddf552695b3de506c86b8fc03e069a5334ba16dbaceff8dc74b9508c113f372f510fb4be9f1333f98e6f5b30
-
Filesize
1.2MB
MD5956972e02044d5255ba631548fab1415
SHA1589ba5d773b4eb338f62e5839838f4f15cae5255
SHA2567037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77
SHA5125aa928d14c01462d68a35cf45643d0364b336379dff15c5867a33dab0bea04481f6d848e5553dc872fb6e20a51e2e3e2c4a6a4fe37a470c72686959d0a3fac19
-
Filesize
1.2MB
MD5956972e02044d5255ba631548fab1415
SHA1589ba5d773b4eb338f62e5839838f4f15cae5255
SHA2567037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77
SHA5125aa928d14c01462d68a35cf45643d0364b336379dff15c5867a33dab0bea04481f6d848e5553dc872fb6e20a51e2e3e2c4a6a4fe37a470c72686959d0a3fac19
-
Filesize
1.2MB
MD5956972e02044d5255ba631548fab1415
SHA1589ba5d773b4eb338f62e5839838f4f15cae5255
SHA2567037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77
SHA5125aa928d14c01462d68a35cf45643d0364b336379dff15c5867a33dab0bea04481f6d848e5553dc872fb6e20a51e2e3e2c4a6a4fe37a470c72686959d0a3fac19
-
Filesize
1.2MB
MD5956972e02044d5255ba631548fab1415
SHA1589ba5d773b4eb338f62e5839838f4f15cae5255
SHA2567037426109cf9e87a56dc4807dbe9981a6ce63071873e3180acdb7402c4a7b77
SHA5125aa928d14c01462d68a35cf45643d0364b336379dff15c5867a33dab0bea04481f6d848e5553dc872fb6e20a51e2e3e2c4a6a4fe37a470c72686959d0a3fac19