Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:26
Behavioral task
behavioral1
Sample
6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.exe
Resource
win7-20220812-en
General
-
Target
6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.exe
-
Size
22KB
-
MD5
ce17d920e84a8704c311f814ba980421
-
SHA1
755c5beb7a15dd3a6d5eb6a5cf6f1326e3dcafa9
-
SHA256
6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191
-
SHA512
daee1137e0c510d848f9fb7ef0b81ad3bfc6399ee4d95ee33584409b2c6f3ac383b86258d36dde7e801c6af9cce6862050c5c6086e0125be3398d21bce7c722e
-
SSDEEP
384:rIiV728hUQ7Y2P/cVEccDdye7kjlWLe7grPiA8jyrMPhTjanbBoZSuniaNJawcuQ:rRGuY2P0Vo6r7SiAwyrMRjbgKnbcuyDw
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File created C:\Windows\system32\drivers\etc\hosts.ics cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts.ics cmd.exe File created C:\Windows\system32\drivers\etc\hosts cmd.exe -
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 1976 attrib.exe 1992 attrib.exe 1968 attrib.exe 1980 attrib.exe -
Processes:
resource yara_rule behavioral1/memory/1372-61-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1372-66-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.execmd.exedescription pid process target process PID 1372 wrote to memory of 1448 1372 6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.exe cmd.exe PID 1372 wrote to memory of 1448 1372 6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.exe cmd.exe PID 1372 wrote to memory of 1448 1372 6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.exe cmd.exe PID 1372 wrote to memory of 1448 1372 6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.exe cmd.exe PID 1448 wrote to memory of 2000 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 2000 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 2000 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 2000 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 2012 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 2012 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 2012 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 2012 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 948 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 948 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 948 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 948 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1928 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1928 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1928 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1928 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1976 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1976 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1976 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1976 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1992 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1992 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1992 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1992 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1968 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1968 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1968 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1968 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1980 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1980 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1980 1448 cmd.exe attrib.exe PID 1448 wrote to memory of 1980 1448 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 8 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1928 attrib.exe 1976 attrib.exe 1992 attrib.exe 1968 attrib.exe 1980 attrib.exe 2000 attrib.exe 2012 attrib.exe 948 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.exe"C:\Users\Admin\AppData\Local\Temp\6a50ec0f1b62a9af3b5d8f387cb228be0c23a81f63ac1ede0c340b077e187191.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\F068.tmp\encrypt.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\drivers\etc\hosts -r -s -h3⤵
- Views/modifies file attributes
PID:2000 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\drivers\etc\hosts.ics -r -s -h3⤵
- Views/modifies file attributes
PID:2012 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\drivers\etc\hosts -r -s -h3⤵
- Views/modifies file attributes
PID:948 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\drivers\etc\hosts.ics -r -s -h3⤵
- Views/modifies file attributes
PID:1928 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\drivers\etc\hosts +r +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1976 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\drivers\etc\hosts.ics +r +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1992 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\drivers\etc\hosts +r +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1968 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\drivers\etc\hosts.ics +r +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5d57e330a794766ec0ff5c9d766f59519
SHA1fa535aae290ad5b44f9a91eb001ad5e164d1f01c
SHA256eed45a63e3b37916d9cf90fafe088022c14c701e844701e81688f4f0e8c19ace
SHA512718e6eefa237edceb049aba6d3f598d0e326988edce8bddd09e3e5e36f22250676517d204b6a80e6bd91cd71ccfc830f60f4221ed3fc8c934b7ae9471431842f