Analysis
-
max time kernel
208s -
max time network
222s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:10
Static task
static1
Behavioral task
behavioral1
Sample
f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe
Resource
win10v2004-20221111-en
General
-
Target
f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe
-
Size
1.4MB
-
MD5
d7c69d01197a39921738367d9155d489
-
SHA1
2c6748c809030d4222f133ad54053ca5b67c1675
-
SHA256
f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26
-
SHA512
0df44840cb4f5d631d286f6299d5094299de4341c82246883457a614ac9c3fc5f9ba24257d27b30325904123c2adf3501f670714cdee3f604c30d8d4e92c95d2
-
SSDEEP
24576:km7WJ9G+jFtpJn7SLibLHlJvsLrS6L5fczyA6djDE8ad6Tz86EeHieAK/PiWWtuj:HYG+jFt0ibLHEJNczyj9FawwuAKnU05
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
Processes:
f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exepid process 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe -
Drops file in Program Files directory 3 IoCs
Processes:
f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exedescription ioc process File created C:\Program Files\Windows Media Player\netmon.exe f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe File created C:\Program Files\Windows Media Player\bugtrap.dll f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe File created C:\Program Files\Windows Media Player\house.mp3 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 3 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exepid process 1644 f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe"C:\Users\Admin\AppData\Local\Temp\f27b7851938a13e2ddcb50f5c12c3c6873edde2bd5856db69a448b7da2268d26.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
PID:1644