Analysis
-
max time kernel
151s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:09
Static task
static1
Behavioral task
behavioral1
Sample
873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe
Resource
win10v2004-20221111-en
General
-
Target
873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe
-
Size
4.1MB
-
MD5
3b066172576b44ce0dd4b3e8fd18e45f
-
SHA1
786380b7ea80726bf05541f6763e1aa3a7d2a928
-
SHA256
873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13
-
SHA512
095c0effa372a85c32cb8ef332aff46e924078e9a668c9428a2ba8f18b27078e85c063f402ad110461fba9c7463524a48f6531bea01173ba66a702e157ae9f81
-
SSDEEP
98304:AyWG9XDKpfBi8x3Ytva4/qn9qUYiWN7li80QttghDj:zWqXD6fBvada4/UMpHE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
key.exedwm.exepid process 1628 key.exe 1600 dwm.exe -
Loads dropped DLL 17 IoCs
Processes:
873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exerundll32.exedwm.exepid process 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1248 1600 dwm.exe 1600 dwm.exe 1600 dwm.exe 1600 dwm.exe 1600 dwm.exe 1600 dwm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
key.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ key.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\tsiVideo = "C:\\Windows\\SysWOW64\\rundll32.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\\\mdi064.dll,asdasd" key.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
rundll32.exepid process 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
rundll32.exepid process 1240 rundll32.exe 1240 rundll32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exekey.exerundll32.exedescription pid process target process PID 2032 wrote to memory of 1628 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe key.exe PID 2032 wrote to memory of 1628 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe key.exe PID 2032 wrote to memory of 1628 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe key.exe PID 2032 wrote to memory of 1628 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe key.exe PID 2032 wrote to memory of 1628 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe key.exe PID 2032 wrote to memory of 1628 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe key.exe PID 2032 wrote to memory of 1628 2032 873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe key.exe PID 1628 wrote to memory of 1240 1628 key.exe rundll32.exe PID 1628 wrote to memory of 1240 1628 key.exe rundll32.exe PID 1628 wrote to memory of 1240 1628 key.exe rundll32.exe PID 1628 wrote to memory of 1240 1628 key.exe rundll32.exe PID 1628 wrote to memory of 1240 1628 key.exe rundll32.exe PID 1628 wrote to memory of 1240 1628 key.exe rundll32.exe PID 1628 wrote to memory of 1240 1628 key.exe rundll32.exe PID 1240 wrote to memory of 1600 1240 rundll32.exe dwm.exe PID 1240 wrote to memory of 1600 1240 rundll32.exe dwm.exe PID 1240 wrote to memory of 1600 1240 rundll32.exe dwm.exe PID 1240 wrote to memory of 1600 1240 rundll32.exe dwm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe"C:\Users\Admin\AppData\Local\Temp\873498869229bca668b18e8a51e1ae70429d390e3f7a557a4631300b380e5e13.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\key.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\\mdi064.dll,asdasd3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exeC:\Users\Admin\AppData\Local\Temp\msupdate71\dwm.exe -a cryptonight -o stratum+tcp://xmr-usa.dwarfpool.com:8080 -p x -u 48mqxx742xV9MJHqHy7XQVJYKT6j1SmJBJTeJSRD2zfve1NdSg9io4yWUCsc7JJH8bgDg9opBicsJZtLTAGzswRiGZGUJ6v.5 -t 164⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD51e2b3c9a215d839c1867bf59590902c0
SHA1b00410980875883c17dc16c90b453fc923bbbedd
SHA2565d2f484e393bd7f17e229d73f9296af8ceaf2e82534b7219306efee465c4e000
SHA51270290c6e85e4f4b990d29151b74dd57aca322379ce9b91a52c6abcb6bec593fc80b3bcedf1fc6cc2ade120e59f3d210ef4304c5e2c9db3e7a00bf2cbce6a6b12
-
Filesize
3.9MB
MD5852502cdc423639a21ce5dda8836ac55
SHA142f159a5e409f0dbe7f07917663c7c8b7793cce3
SHA256e555e98469ed8b457ebee6399b06b7f1c751d5b86b0987a8e0a39245e7cea823
SHA512551d3faca3e55bbf52f234e1c7248a3aa8fcc6c8e2ae6b59ad53c844a9b3b6dd1e2b6ba62521d9903fcce9a823633f8b212e127ebbbf7e6a9baa7d6046f20e89
-
Filesize
3.8MB
MD5911d846de9a854d93028f9d9e8db479a
SHA100360e23ed355d61cd5fd1d6fa8144f2b81a3720
SHA256a989d4854e9ec97d6ea7d4a6ddfdf12f0aadaa4283c4895c8d55c0864aae46c2
SHA512eaf0e0b46ffa11a4e1107d9bab6d29fbf91be1949e908a2a16d8336410b8069c133739e2c257d6910747e6a520841c96ae27c4b6fd3a39ebbfa884b2a2cc0049
-
Filesize
892KB
MD5280f8f7783a017ca177b960175ed92d2
SHA1413dad9703f937c90f4aba10b4c7a139214b5fd1
SHA2565d698f9c78f4bd1e84b95b0d67c797ec15183c6c77f04963a7a8fbce52fc70a6
SHA5125c432f7600715023bf97bdbab38fdd03a03ff541357e43ea7231f56c2776b6dfc41aa6c6dc475b8000915e6e4c28a7a88cf81b0a7452fdb16a9e804d4503124d
-
Filesize
511KB
MD57424fae1cb2ae5c8c63cdf34006584c9
SHA1d773366a6af5e38f23d6d679a9ea6a68b87ae701
SHA25636bba4597db17fa602332bb9f9b5947be94c9b5f55d084e0160a9de13acbfbd5
SHA5127316a98d1fc13c07bcacfcfc9731e9a21b144935fc24fb0f0f7aefa4804e01490f85ba48d58629d55f9650b0bc7992243721fa280aa5747a153fe9235eb7e0f8
-
Filesize
927KB
MD507edeef3e6042265c4de3fd97646f9b5
SHA114985caf62f83fbb1263c5717887ebc5871c475f
SHA256c48305c56086053cdc59c75c1db3a78d308eba5312168b8586e61c960f9d7d6e
SHA5120daac08592e057eeca357b61a7d8c0d605aa079c22f50eaa1a69f2a4b7eaa60e324ace83974866497ffa401337c9f3f48386ebbce6565ef5336e6bc4fb2da518
-
Filesize
206KB
MD5cdcf4bf6939a71eeedc5e06fbe6c7e25
SHA1c0387a8b01793646ba1a4ae719ecf5069980485b
SHA256ffbbf8c6afd5e4d70e66d978719e3096798b0a8503a8c8f492fc71e468fc4ca9
SHA512f559d5688da4313a4565401ee40c338a652f6361a4a5eee6639545ba0fff7709ef910696689548a9598ea4cb9911646115cdcab04c31c1a737482dc67833a37e
-
Filesize
112KB
MD5ac0ffab1af0959006783344ee03c7305
SHA116cb4a360faaaf83c90b9466b166c970b48971ac
SHA256f5270156ed8261aecc135417b5e043eea7cabd0251048c87a718c6cd57fe5e4e
SHA51256d93da8e5af20eb5aed2b0ded70630bb43da0553c23243fa08ba796003fc0e41960e624596310ec4f31e3ebd4afbffec83beb86893e25f31b6d677b1a2d7c82
-
Filesize
298KB
MD52c1ca56436ad413c41e30eff10d65243
SHA1b1c3a9efef5b9bee5bcc1b2758da0c00d8156fec
SHA256506d4a61285958ea387b4ef1feffc872f3d389dff733495a976feabc39e3e445
SHA51230877c77e57ca8e45b311734879111b1d0db39855b05d134456659afa84e92db65c1fe399aae063b39582d6e4e1a6fd43504a41c2c08b75b1b63fb22add7c4ea
-
Filesize
113KB
MD5cb0577e362e193cad14c3d23c40c30d4
SHA165db52c270bc8f1e9435d95456da9f1e45e74fd9
SHA2569e93a45fb249f32d1aac4e69ce84ceae783782e75148e572fdde3bfe2579121c
SHA5124c1cc231599e0928ae67d1e3493417b35c6185739795b00da8cad6580a44f56df3769d652f8dd1798e762c11e87904bf0624fe6c2392b2e35fba15160959b32b
-
Filesize
75KB
MD51e2b3c9a215d839c1867bf59590902c0
SHA1b00410980875883c17dc16c90b453fc923bbbedd
SHA2565d2f484e393bd7f17e229d73f9296af8ceaf2e82534b7219306efee465c4e000
SHA51270290c6e85e4f4b990d29151b74dd57aca322379ce9b91a52c6abcb6bec593fc80b3bcedf1fc6cc2ade120e59f3d210ef4304c5e2c9db3e7a00bf2cbce6a6b12
-
Filesize
75KB
MD51e2b3c9a215d839c1867bf59590902c0
SHA1b00410980875883c17dc16c90b453fc923bbbedd
SHA2565d2f484e393bd7f17e229d73f9296af8ceaf2e82534b7219306efee465c4e000
SHA51270290c6e85e4f4b990d29151b74dd57aca322379ce9b91a52c6abcb6bec593fc80b3bcedf1fc6cc2ade120e59f3d210ef4304c5e2c9db3e7a00bf2cbce6a6b12
-
Filesize
75KB
MD51e2b3c9a215d839c1867bf59590902c0
SHA1b00410980875883c17dc16c90b453fc923bbbedd
SHA2565d2f484e393bd7f17e229d73f9296af8ceaf2e82534b7219306efee465c4e000
SHA51270290c6e85e4f4b990d29151b74dd57aca322379ce9b91a52c6abcb6bec593fc80b3bcedf1fc6cc2ade120e59f3d210ef4304c5e2c9db3e7a00bf2cbce6a6b12
-
Filesize
75KB
MD51e2b3c9a215d839c1867bf59590902c0
SHA1b00410980875883c17dc16c90b453fc923bbbedd
SHA2565d2f484e393bd7f17e229d73f9296af8ceaf2e82534b7219306efee465c4e000
SHA51270290c6e85e4f4b990d29151b74dd57aca322379ce9b91a52c6abcb6bec593fc80b3bcedf1fc6cc2ade120e59f3d210ef4304c5e2c9db3e7a00bf2cbce6a6b12
-
Filesize
3.8MB
MD5911d846de9a854d93028f9d9e8db479a
SHA100360e23ed355d61cd5fd1d6fa8144f2b81a3720
SHA256a989d4854e9ec97d6ea7d4a6ddfdf12f0aadaa4283c4895c8d55c0864aae46c2
SHA512eaf0e0b46ffa11a4e1107d9bab6d29fbf91be1949e908a2a16d8336410b8069c133739e2c257d6910747e6a520841c96ae27c4b6fd3a39ebbfa884b2a2cc0049
-
Filesize
3.8MB
MD5911d846de9a854d93028f9d9e8db479a
SHA100360e23ed355d61cd5fd1d6fa8144f2b81a3720
SHA256a989d4854e9ec97d6ea7d4a6ddfdf12f0aadaa4283c4895c8d55c0864aae46c2
SHA512eaf0e0b46ffa11a4e1107d9bab6d29fbf91be1949e908a2a16d8336410b8069c133739e2c257d6910747e6a520841c96ae27c4b6fd3a39ebbfa884b2a2cc0049
-
Filesize
3.8MB
MD5911d846de9a854d93028f9d9e8db479a
SHA100360e23ed355d61cd5fd1d6fa8144f2b81a3720
SHA256a989d4854e9ec97d6ea7d4a6ddfdf12f0aadaa4283c4895c8d55c0864aae46c2
SHA512eaf0e0b46ffa11a4e1107d9bab6d29fbf91be1949e908a2a16d8336410b8069c133739e2c257d6910747e6a520841c96ae27c4b6fd3a39ebbfa884b2a2cc0049
-
Filesize
3.8MB
MD5911d846de9a854d93028f9d9e8db479a
SHA100360e23ed355d61cd5fd1d6fa8144f2b81a3720
SHA256a989d4854e9ec97d6ea7d4a6ddfdf12f0aadaa4283c4895c8d55c0864aae46c2
SHA512eaf0e0b46ffa11a4e1107d9bab6d29fbf91be1949e908a2a16d8336410b8069c133739e2c257d6910747e6a520841c96ae27c4b6fd3a39ebbfa884b2a2cc0049
-
Filesize
892KB
MD5280f8f7783a017ca177b960175ed92d2
SHA1413dad9703f937c90f4aba10b4c7a139214b5fd1
SHA2565d698f9c78f4bd1e84b95b0d67c797ec15183c6c77f04963a7a8fbce52fc70a6
SHA5125c432f7600715023bf97bdbab38fdd03a03ff541357e43ea7231f56c2776b6dfc41aa6c6dc475b8000915e6e4c28a7a88cf81b0a7452fdb16a9e804d4503124d
-
Filesize
892KB
MD5280f8f7783a017ca177b960175ed92d2
SHA1413dad9703f937c90f4aba10b4c7a139214b5fd1
SHA2565d698f9c78f4bd1e84b95b0d67c797ec15183c6c77f04963a7a8fbce52fc70a6
SHA5125c432f7600715023bf97bdbab38fdd03a03ff541357e43ea7231f56c2776b6dfc41aa6c6dc475b8000915e6e4c28a7a88cf81b0a7452fdb16a9e804d4503124d
-
Filesize
892KB
MD5280f8f7783a017ca177b960175ed92d2
SHA1413dad9703f937c90f4aba10b4c7a139214b5fd1
SHA2565d698f9c78f4bd1e84b95b0d67c797ec15183c6c77f04963a7a8fbce52fc70a6
SHA5125c432f7600715023bf97bdbab38fdd03a03ff541357e43ea7231f56c2776b6dfc41aa6c6dc475b8000915e6e4c28a7a88cf81b0a7452fdb16a9e804d4503124d
-
Filesize
511KB
MD57424fae1cb2ae5c8c63cdf34006584c9
SHA1d773366a6af5e38f23d6d679a9ea6a68b87ae701
SHA25636bba4597db17fa602332bb9f9b5947be94c9b5f55d084e0160a9de13acbfbd5
SHA5127316a98d1fc13c07bcacfcfc9731e9a21b144935fc24fb0f0f7aefa4804e01490f85ba48d58629d55f9650b0bc7992243721fa280aa5747a153fe9235eb7e0f8
-
Filesize
927KB
MD507edeef3e6042265c4de3fd97646f9b5
SHA114985caf62f83fbb1263c5717887ebc5871c475f
SHA256c48305c56086053cdc59c75c1db3a78d308eba5312168b8586e61c960f9d7d6e
SHA5120daac08592e057eeca357b61a7d8c0d605aa079c22f50eaa1a69f2a4b7eaa60e324ace83974866497ffa401337c9f3f48386ebbce6565ef5336e6bc4fb2da518
-
Filesize
206KB
MD5cdcf4bf6939a71eeedc5e06fbe6c7e25
SHA1c0387a8b01793646ba1a4ae719ecf5069980485b
SHA256ffbbf8c6afd5e4d70e66d978719e3096798b0a8503a8c8f492fc71e468fc4ca9
SHA512f559d5688da4313a4565401ee40c338a652f6361a4a5eee6639545ba0fff7709ef910696689548a9598ea4cb9911646115cdcab04c31c1a737482dc67833a37e
-
Filesize
112KB
MD5ac0ffab1af0959006783344ee03c7305
SHA116cb4a360faaaf83c90b9466b166c970b48971ac
SHA256f5270156ed8261aecc135417b5e043eea7cabd0251048c87a718c6cd57fe5e4e
SHA51256d93da8e5af20eb5aed2b0ded70630bb43da0553c23243fa08ba796003fc0e41960e624596310ec4f31e3ebd4afbffec83beb86893e25f31b6d677b1a2d7c82
-
Filesize
298KB
MD52c1ca56436ad413c41e30eff10d65243
SHA1b1c3a9efef5b9bee5bcc1b2758da0c00d8156fec
SHA256506d4a61285958ea387b4ef1feffc872f3d389dff733495a976feabc39e3e445
SHA51230877c77e57ca8e45b311734879111b1d0db39855b05d134456659afa84e92db65c1fe399aae063b39582d6e4e1a6fd43504a41c2c08b75b1b63fb22add7c4ea
-
Filesize
113KB
MD5cb0577e362e193cad14c3d23c40c30d4
SHA165db52c270bc8f1e9435d95456da9f1e45e74fd9
SHA2569e93a45fb249f32d1aac4e69ce84ceae783782e75148e572fdde3bfe2579121c
SHA5124c1cc231599e0928ae67d1e3493417b35c6185739795b00da8cad6580a44f56df3769d652f8dd1798e762c11e87904bf0624fe6c2392b2e35fba15160959b32b