Analysis
-
max time kernel
174s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 05:18
Static task
static1
Behavioral task
behavioral1
Sample
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe
Resource
win10v2004-20221111-en
General
-
Target
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe
-
Size
388KB
-
MD5
ee48923e9421a22a7ce1af204faf3495
-
SHA1
91e2e2894c5a291deece18edf727bff17460b267
-
SHA256
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d
-
SHA512
f562d7ee04a8f5709ba2553a78123049130a89f33c650d0d5b824d0c009c8fab7e2c1297508ac50849c06b38574521c7dab76337134b41f1e046aa1c89c7dd1d
-
SSDEEP
6144:08tK5Ggk1+vOd0RneBRQALcMqB6D5B1RDHmIEaqddK:uMgk1Yd8R2MqIDz1xHmIPQg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
System.exeSystem.exepid process 760 System.exe 1280 System.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
System.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Torrent = "\"C:\\windows\\System.exe\"" System.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exeSystem.exedescription pid process target process PID 2024 set thread context of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 760 set thread context of 1280 760 System.exe System.exe -
Drops file in Windows directory 3 IoCs
Processes:
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exeSystem.exedescription ioc process File created \??\c:\windows\System.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe File opened for modification \??\c:\windows\System.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe File opened for modification C:\windows\System.exe System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exeSystem.exepid process 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe 760 System.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exeSystem.exepid process 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe 760 System.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exea509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exeSystem.exedescription pid process target process PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 2024 wrote to memory of 1968 2024 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe PID 1968 wrote to memory of 760 1968 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe System.exe PID 1968 wrote to memory of 760 1968 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe System.exe PID 1968 wrote to memory of 760 1968 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe System.exe PID 1968 wrote to memory of 760 1968 a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe PID 760 wrote to memory of 1280 760 System.exe System.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe"C:\Users\Admin\AppData\Local\Temp\a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe"C:\Users\Admin\AppData\Local\Temp\a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\windows\System.exe"C:\windows\System.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\windows\System.exe"C:\windows\System.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5ee48923e9421a22a7ce1af204faf3495
SHA191e2e2894c5a291deece18edf727bff17460b267
SHA256a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d
SHA512f562d7ee04a8f5709ba2553a78123049130a89f33c650d0d5b824d0c009c8fab7e2c1297508ac50849c06b38574521c7dab76337134b41f1e046aa1c89c7dd1d
-
Filesize
388KB
MD5ee48923e9421a22a7ce1af204faf3495
SHA191e2e2894c5a291deece18edf727bff17460b267
SHA256a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d
SHA512f562d7ee04a8f5709ba2553a78123049130a89f33c650d0d5b824d0c009c8fab7e2c1297508ac50849c06b38574521c7dab76337134b41f1e046aa1c89c7dd1d
-
Filesize
388KB
MD5ee48923e9421a22a7ce1af204faf3495
SHA191e2e2894c5a291deece18edf727bff17460b267
SHA256a509cc02a8ad2c8f730e9e81e21375bd2ead873435370d9a996535822af8031d
SHA512f562d7ee04a8f5709ba2553a78123049130a89f33c650d0d5b824d0c009c8fab7e2c1297508ac50849c06b38574521c7dab76337134b41f1e046aa1c89c7dd1d