Analysis
-
max time kernel
146s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 05:11
Static task
static1
Behavioral task
behavioral1
Sample
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe
Resource
win10v2004-20220901-en
General
-
Target
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe
-
Size
246KB
-
MD5
e49674d4e8d40e42a9ce4a80f5435718
-
SHA1
c32153d203baa003b8bb824fc254b27b48eaffa5
-
SHA256
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32
-
SHA512
4c9afb978696717600e7354ccc7e0f1501c8882fc674203f6897f2abd364721b3f79aac46dc987cb06f9ebefa434106c0c2d1162446ea241ee1d3b38d4ee3b3d
-
SSDEEP
3072:x9DN6r8pitRYykcpxDXCf3KUdWwsZYibnqihXnz1/coipCRVEQpsvIXEd/9Ox16:tTEfTrZUdWws57qiZZBmyE7Ox16
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exepid process 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 1324 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe -
Processes:
resource yara_rule behavioral1/memory/900-57-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/900-61-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/900-62-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/900-63-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/900-64-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/900-66-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1324-82-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1324-83-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1324-84-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/1324-85-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2028 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 2028 cmd.exe 2028 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32 = "C:\\ProgramData\\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe" 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exedescription pid process target process PID 2024 set thread context of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 set thread context of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exepid process 1324 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exepid process 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.execmd.exe8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exedescription pid process target process PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2024 wrote to memory of 900 2024 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 900 wrote to memory of 2028 900 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe cmd.exe PID 900 wrote to memory of 2028 900 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe cmd.exe PID 900 wrote to memory of 2028 900 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe cmd.exe PID 900 wrote to memory of 2028 900 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe cmd.exe PID 2028 wrote to memory of 580 2028 cmd.exe PING.EXE PID 2028 wrote to memory of 580 2028 cmd.exe PING.EXE PID 2028 wrote to memory of 580 2028 cmd.exe PING.EXE PID 2028 wrote to memory of 580 2028 cmd.exe PING.EXE PID 2028 wrote to memory of 1276 2028 cmd.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2028 wrote to memory of 1276 2028 cmd.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2028 wrote to memory of 1276 2028 cmd.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 2028 wrote to memory of 1276 2028 cmd.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe PID 1276 wrote to memory of 1324 1276 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe 8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe"C:\Users\Admin\AppData\Local\Temp\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe"C:\Users\Admin\AppData\Local\Temp\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.bat" "3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:580 -
C:\ProgramData\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe"C:\ProgramData\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\ProgramData\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe"C:\ProgramData\8f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
451B
MD51223bac65e188891452c28655e19008b
SHA140476ed6258b8878a31e3546b934d102025fefa1
SHA2562bfff1888ab8bc65592e9c2cb74108bc3aafe022e1fa1a3d00a552209d4408ca
SHA512e374ebfb5422b2827ce71dc3b65e8ca82add0662fda036710aedf39c36ee9377880b58e28c038f61f4ad867469d89626b3b696fadd1f49471fd0a1e0d5b65f76
-
Filesize
246KB
MD5e49674d4e8d40e42a9ce4a80f5435718
SHA1c32153d203baa003b8bb824fc254b27b48eaffa5
SHA2568f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32
SHA5124c9afb978696717600e7354ccc7e0f1501c8882fc674203f6897f2abd364721b3f79aac46dc987cb06f9ebefa434106c0c2d1162446ea241ee1d3b38d4ee3b3d
-
Filesize
246KB
MD5e49674d4e8d40e42a9ce4a80f5435718
SHA1c32153d203baa003b8bb824fc254b27b48eaffa5
SHA2568f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32
SHA5124c9afb978696717600e7354ccc7e0f1501c8882fc674203f6897f2abd364721b3f79aac46dc987cb06f9ebefa434106c0c2d1162446ea241ee1d3b38d4ee3b3d
-
Filesize
246KB
MD5e49674d4e8d40e42a9ce4a80f5435718
SHA1c32153d203baa003b8bb824fc254b27b48eaffa5
SHA2568f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32
SHA5124c9afb978696717600e7354ccc7e0f1501c8882fc674203f6897f2abd364721b3f79aac46dc987cb06f9ebefa434106c0c2d1162446ea241ee1d3b38d4ee3b3d
-
Filesize
246KB
MD5e49674d4e8d40e42a9ce4a80f5435718
SHA1c32153d203baa003b8bb824fc254b27b48eaffa5
SHA2568f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32
SHA5124c9afb978696717600e7354ccc7e0f1501c8882fc674203f6897f2abd364721b3f79aac46dc987cb06f9ebefa434106c0c2d1162446ea241ee1d3b38d4ee3b3d
-
Filesize
246KB
MD5e49674d4e8d40e42a9ce4a80f5435718
SHA1c32153d203baa003b8bb824fc254b27b48eaffa5
SHA2568f256b9b3807fd53c905636d61c276872d3703bb53675b437bead4178554db32
SHA5124c9afb978696717600e7354ccc7e0f1501c8882fc674203f6897f2abd364721b3f79aac46dc987cb06f9ebefa434106c0c2d1162446ea241ee1d3b38d4ee3b3d