Analysis
-
max time kernel
159s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:54
Static task
static1
Behavioral task
behavioral1
Sample
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe
Resource
win10v2004-20220812-en
General
-
Target
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe
-
Size
10KB
-
MD5
364d2e72f27e8b3e202ed4658dab9228
-
SHA1
13870035968c15cf8c69ecebdc35b4870e6661fb
-
SHA256
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f
-
SHA512
7094029f737a4b488318a45b7c6817d232f942e0c92001f78a761ededb64ea87d5c063d9ef1789c006c83b36875a3ba6c59cd1e22af939d6771d9e01578629dc
-
SSDEEP
192:4oUJ8AaGmQXNHevO8SebnETar+KMV86I1csZp1+Xi:4oUJ5Cw58SeETIu+ZpT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DRCTROY.exepid process 1440 DRCTROY.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Loads dropped DLL 2 IoCs
Processes:
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exepid process 1080 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe 1080 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exeDRCTROY.exedescription pid process target process PID 1080 wrote to memory of 1440 1080 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe DRCTROY.exe PID 1080 wrote to memory of 1440 1080 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe DRCTROY.exe PID 1080 wrote to memory of 1440 1080 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe DRCTROY.exe PID 1080 wrote to memory of 1440 1080 6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe DRCTROY.exe PID 1440 wrote to memory of 1764 1440 DRCTROY.exe netsh.exe PID 1440 wrote to memory of 1764 1440 DRCTROY.exe netsh.exe PID 1440 wrote to memory of 1764 1440 DRCTROY.exe netsh.exe PID 1440 wrote to memory of 1764 1440 DRCTROY.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe"C:\Users\Admin\AppData\Local\Temp\6deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\DRCTROY.exe"C:\Users\Admin\AppData\Local\Temp\DRCTROY.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\DRCTROY.exe" "DRCTROY.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5364d2e72f27e8b3e202ed4658dab9228
SHA113870035968c15cf8c69ecebdc35b4870e6661fb
SHA2566deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f
SHA5127094029f737a4b488318a45b7c6817d232f942e0c92001f78a761ededb64ea87d5c063d9ef1789c006c83b36875a3ba6c59cd1e22af939d6771d9e01578629dc
-
Filesize
10KB
MD5364d2e72f27e8b3e202ed4658dab9228
SHA113870035968c15cf8c69ecebdc35b4870e6661fb
SHA2566deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f
SHA5127094029f737a4b488318a45b7c6817d232f942e0c92001f78a761ededb64ea87d5c063d9ef1789c006c83b36875a3ba6c59cd1e22af939d6771d9e01578629dc
-
Filesize
10KB
MD5364d2e72f27e8b3e202ed4658dab9228
SHA113870035968c15cf8c69ecebdc35b4870e6661fb
SHA2566deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f
SHA5127094029f737a4b488318a45b7c6817d232f942e0c92001f78a761ededb64ea87d5c063d9ef1789c006c83b36875a3ba6c59cd1e22af939d6771d9e01578629dc
-
Filesize
10KB
MD5364d2e72f27e8b3e202ed4658dab9228
SHA113870035968c15cf8c69ecebdc35b4870e6661fb
SHA2566deb79fa90d40bba28bdc06046499ed301b2ce74e9fde9c20605570fc430905f
SHA5127094029f737a4b488318a45b7c6817d232f942e0c92001f78a761ededb64ea87d5c063d9ef1789c006c83b36875a3ba6c59cd1e22af939d6771d9e01578629dc