Analysis
-
max time kernel
203s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 05:09
Static task
static1
Behavioral task
behavioral1
Sample
0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe
Resource
win10v2004-20221111-en
General
-
Target
0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe
-
Size
277KB
-
MD5
53cda9ef44c8efa08900b21c569f2f99
-
SHA1
a557562aa8c06cea50176e4f22cfe3c652441873
-
SHA256
0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6
-
SHA512
94cfa19730e5341a494dee44bfe313eb8bed6f620a62ae99d54672c4da045632a2778d65a7aa9d4f9c5488a975a903515b049fb8eaac5ab277868745ea721044
-
SSDEEP
6144:5wHysfSJnooGdv/ho0de97vfH7KSOTDr0cVEobKuahuHJLZ:Cqyokv5m73zOTH0cVEYKuHlZ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exepid process 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{3F97F137-7DE1-4A6A-AE48-FCC9733A43F7}\\f5ea51da.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{3F97F137-7DE1-4A6A-AE48-FCC9733A43F7}\\f5ea51da.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exedescription pid process target process PID 2020 set thread context of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exepid process 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1204 -
Suspicious behavior: MapViewOfSection 26 IoCs
Processes:
0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exeexplorer.exepid process 728 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 728 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe 1276 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
explorer.exedescription pid process Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeDebugPrivilege 1276 explorer.exe Token: SeAssignPrimaryTokenPrivilege 860 Token: SeIncreaseQuotaPrivilege 860 Token: SeSecurityPrivilege 860 Token: SeTakeOwnershipPrivilege 860 Token: SeLoadDriverPrivilege 860 Token: SeRestorePrivilege 860 Token: SeSystemEnvironmentPrivilege 860 Token: SeAssignPrimaryTokenPrivilege 860 Token: SeIncreaseQuotaPrivilege 860 Token: SeSecurityPrivilege 860 Token: SeTakeOwnershipPrivilege 860 Token: SeLoadDriverPrivilege 860 Token: SeSystemtimePrivilege 860 Token: SeBackupPrivilege 860 Token: SeRestorePrivilege 860 Token: SeShutdownPrivilege 860 Token: SeSystemEnvironmentPrivilege 860 Token: SeUndockPrivilege 860 Token: SeManageVolumePrivilege 860 Token: SeAssignPrimaryTokenPrivilege 860 Token: SeIncreaseQuotaPrivilege 860 Token: SeSecurityPrivilege 860 Token: SeTakeOwnershipPrivilege 860 Token: SeLoadDriverPrivilege 860 Token: SeRestorePrivilege 860 Token: SeSystemEnvironmentPrivilege 860 Token: SeAssignPrimaryTokenPrivilege 860 Token: SeIncreaseQuotaPrivilege 860 Token: SeSecurityPrivilege 860 Token: SeTakeOwnershipPrivilege 860 Token: SeLoadDriverPrivilege 860 Token: SeRestorePrivilege 860 Token: SeSystemEnvironmentPrivilege 860 Token: SeAssignPrimaryTokenPrivilege 860 Token: SeIncreaseQuotaPrivilege 860 Token: SeSecurityPrivilege 860 Token: SeTakeOwnershipPrivilege 860 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1204 1204 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1204 1204 -
Suspicious use of UnmapMainImage 8 IoCs
Processes:
pid process 792 792 792 792 792 792 1204 1204 -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exedescription pid process target process PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 2020 wrote to memory of 728 2020 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe PID 728 wrote to memory of 1276 728 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe explorer.exe PID 728 wrote to memory of 1276 728 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe explorer.exe PID 728 wrote to memory of 1276 728 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe explorer.exe PID 728 wrote to memory of 1276 728 0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe"C:\Users\Admin\AppData\Local\Temp\0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe"C:\Users\Admin\AppData\Local\Temp\0edabe7722359593c261ce992bcf2c8decb8df7b35e538d328f5d5e15b283cd6.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD58da8ca180453926a6ff3e3008421b8a2
SHA13aa994c4a56e67bbb8d6f7c2bb5a4c42156d3870
SHA2566b34d5c64fb635fe2dc5fbbe61c30eae196d389fa107ca11a9efb0bf377c2c77
SHA512f29a2ede38df080b831420eecb68a933ba8caa054809d4f8fb698078d107c28f5b95e2e62b341d10b83f9b8d010c0d7622440d1c74b13aca486b8daf5eecdd01