Analysis
-
max time kernel
43s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe
Resource
win10v2004-20221111-en
General
-
Target
534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe
-
Size
5.0MB
-
MD5
113d002fe85128605a6b890f4e9e2e62
-
SHA1
85a7f30eb66bdefb5bf5c298339ace949cb8ef30
-
SHA256
534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12
-
SHA512
e9d7f5690499223111b9665563fa02cf6b3762dac1be775aeefb78f9e64046f24f038fab6ee007283828dce99719e23860699d2c31af90e71237eb4107a1b9c0
-
SSDEEP
98304:xd4TKgy+GDBJp4PvBwPMw0r86JBT2zSjUFC9S6oFv2dOJJnH6u4TkJmL8V0YQImX:QTryl3pmvBwPMHrpWSQLXvHJJbKkJmCs
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
Processes:
534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exepid process 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exepid process 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe 1092 534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe"C:\Users\Admin\AppData\Local\Temp\534b97a8b15458152f4a3a8bcfa6f2ad79d5f3fae49b74bf4496e003515d4e12.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5aea3ac67fa68fd3f00edfbf9b43a2770
SHA1aa59d1a4311c42b612ee66a027f224261beebbc3
SHA256f4530c734e3ce6253ffa6e5d755d61e4709ab9fc3b0eee3d4cdb89ec89c48bd2
SHA512ffb6abc624d50ae8bc9c83ff518cb532dfd076f107077dceaf0e23d11c186a18671a5f538270be8b0b986e41ad1981a3606995046a6ee7b6b64a33c83ed72df9
-
Filesize
7KB
MD592debab0caea94c3e571e892fdde60dd
SHA1fcd1f711b3c649b5cf5cc134e19524489084e456
SHA256508b06710e1c3d4456d14a28ffa89c42097a9388ce44a6148ee1a3a3d5a26bcd
SHA5122169d071c0c570b236c7224141dfb460a4cd6eb6e2e7fdf081c8d88d9173f639881d0dc2e33bc4881432637fb1a7336b7815236a70cf5ee638f8142d787a94fc
-
Filesize
22KB
MD52312a7ac514325c2f1efc6f4cfdecd61
SHA17d12b05a867ec6d40f174c797dc3b691e6fa2408
SHA256fb9cc3565cf89cf862665003b329be514e1fbcdef83a9ed994238800156de983
SHA512187ef38f755f1e30524e3d60d1d4188160b654f2430c0246e160d9e8971d565986010a47a9ef3c8ca99eae7e0993c8be0b2cb93345cc6f30b179206f57e54b9c
-
Filesize
18KB
MD5ae60f7858d2318f81514e01b925f74ca
SHA1292fe609aebc4f213c44d94a6c68dfb5a499f2ef
SHA2569d7ffe7082c92d85522d82faa8767bc3ef744a85455c336f99b5e8e288a6cead
SHA5129fb698c8f8154779e5957336eb57fb97c9bdf50f53245b353c21ae4a52b25b86f910fa6095e6ed74bf0812a4935df62903efe2079713e15c2168cdca6f0048be
-
Filesize
14KB
MD5a5a4cee2eb89d2687c05ef74299f0dba
SHA1b9bff5987be422887f2f402357b47db2288a1a42
SHA256cb82268b778703db75961cddef33a695a674f0dfd28b7e710b198ef2d26d3963
SHA512f485267c6239f84d294ed4b0a82f317081e6e2e0c5613bd012bbd496b9ebccb8aca6944e80f84af51d17ac13f4d83480c34edfe37a3a9508ce0e67fc9f0b96f0
-
Filesize
14KB
MD5a5a4cee2eb89d2687c05ef74299f0dba
SHA1b9bff5987be422887f2f402357b47db2288a1a42
SHA256cb82268b778703db75961cddef33a695a674f0dfd28b7e710b198ef2d26d3963
SHA512f485267c6239f84d294ed4b0a82f317081e6e2e0c5613bd012bbd496b9ebccb8aca6944e80f84af51d17ac13f4d83480c34edfe37a3a9508ce0e67fc9f0b96f0
-
Filesize
11KB
MD5960a5c48e25cf2bca332e74e11d825c9
SHA1da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da
-
Filesize
11KB
MD5960a5c48e25cf2bca332e74e11d825c9
SHA1da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da
-
Filesize
9KB
MD58ced0b79f7b9033d0795aab3be6d627c
SHA190c2043ffccd068f407c624c50ac7b795db1e132
SHA256495bddc0be6e18e981db82fab9d1de55c7e269ab4ec3ff43035193bc017a307b
SHA512e38f63a342729f5ff6d0db607d7877b65c33ed19e2b5a97dd868ece8c2a3e829d4153624943444be2f0de885496161d54c1da9594bdc0a5a0bcc8b727e2facb0
-
Filesize
10KB
MD5e9a68378671dfc74e7715b47291e141a
SHA13178de37b31120525bff70ab620aa3473a01edf1
SHA256630fce9497fb76e4f72e20741593fba7c30d72e8abdc085f3848d8c3ff31603e
SHA512c17ed60f4983d853182f8be991c0f72fae03e208640442ccea0b935cd27d860a263eb962c08d05089d0c79c0556d9d266da548bf7df981483a989acc1412b24f