Analysis
-
max time kernel
148s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe
Resource
win10v2004-20220812-en
General
-
Target
e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe
-
Size
608KB
-
MD5
22b68e8a9572775e7a9ea9ab215fdd4c
-
SHA1
1416c3fdcafd6a6c4c6c0f4b1a4bdbfceb057733
-
SHA256
e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517
-
SHA512
59a3a92b22dcf285f3c978585f2341b94a5784df069964ed3afa8026a71271189b543c848af4db4202386187e43c95605779127a1316ce7c2fc98da0f2c4dbc0
-
SSDEEP
12288:u9uAMJd+ZVA7lubbZWLDBiJUfU9OS8feM2:u9u1/lublm1iK6t
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\WinApp\\GoogleUpdate.exe,explorer.exe" reg.exe -
Executes dropped EXE 1 IoCs
pid Process 380 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe Token: SeDebugPrivilege 380 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 380 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2036 wrote to memory of 936 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 28 PID 2036 wrote to memory of 936 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 28 PID 2036 wrote to memory of 936 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 28 PID 2036 wrote to memory of 936 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 28 PID 936 wrote to memory of 476 936 cmd.exe 30 PID 936 wrote to memory of 476 936 cmd.exe 30 PID 936 wrote to memory of 476 936 cmd.exe 30 PID 936 wrote to memory of 476 936 cmd.exe 30 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31 PID 2036 wrote to memory of 380 2036 e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe"C:\Users\Admin\AppData\Local\Temp\e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinApp\GoogleUpdate.exe,explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinApp\GoogleUpdate.exe,explorer.exe"3⤵
- Modifies WinLogon for persistence
PID:476
-
-
-
C:\Users\Admin\AppData\Local\Temp\e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe"C:\Users\Admin\AppData\Local\Temp\e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:380
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe
Filesize608KB
MD522b68e8a9572775e7a9ea9ab215fdd4c
SHA11416c3fdcafd6a6c4c6c0f4b1a4bdbfceb057733
SHA256e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517
SHA51259a3a92b22dcf285f3c978585f2341b94a5784df069964ed3afa8026a71271189b543c848af4db4202386187e43c95605779127a1316ce7c2fc98da0f2c4dbc0
-
\Users\Admin\AppData\Local\Temp\e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517.exe
Filesize608KB
MD522b68e8a9572775e7a9ea9ab215fdd4c
SHA11416c3fdcafd6a6c4c6c0f4b1a4bdbfceb057733
SHA256e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517
SHA51259a3a92b22dcf285f3c978585f2341b94a5784df069964ed3afa8026a71271189b543c848af4db4202386187e43c95605779127a1316ce7c2fc98da0f2c4dbc0
-
Filesize
608KB
MD522b68e8a9572775e7a9ea9ab215fdd4c
SHA11416c3fdcafd6a6c4c6c0f4b1a4bdbfceb057733
SHA256e82ce1fcb3f98208cc5b028382132c0e201c3688c147d5f6d2150223e70bb517
SHA51259a3a92b22dcf285f3c978585f2341b94a5784df069964ed3afa8026a71271189b543c848af4db4202386187e43c95605779127a1316ce7c2fc98da0f2c4dbc0