Analysis
-
max time kernel
184s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:43
Static task
static1
Behavioral task
behavioral1
Sample
8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exe
Resource
win10v2004-20220812-en
General
-
Target
8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exe
-
Size
104KB
-
MD5
b8997772ff477520de562d39b9a09b22
-
SHA1
67915490d3ff1e3bab7d64b70baa556337eea8fe
-
SHA256
8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19
-
SHA512
29e4a35b8eb4ddfc8b462c2d4f58cd0c268dd37f2b2594bb3a03e09b1b0c1b64b30fae57c2dcfa55ee7d2a2180796455d473ba21317c8e7683935c21b1cb1859
-
SSDEEP
3072:4gXdZt9P6D3XJcM8kR7PGszZueuCURNi66DxKP13Lvl:4e34f8kRygZuD9RNi68xI1rl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
wzfxydxc.exewzfxydxc.exepid process 532 wzfxydxc.exe 5060 wzfxydxc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wzfxydxc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wzfxydxc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wzfxydxc.exedescription pid process target process PID 532 set thread context of 5060 532 wzfxydxc.exe wzfxydxc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
wzfxydxc.exepid process 5060 wzfxydxc.exe 5060 wzfxydxc.exe 5060 wzfxydxc.exe 5060 wzfxydxc.exe 5060 wzfxydxc.exe 5060 wzfxydxc.exe 5060 wzfxydxc.exe 5060 wzfxydxc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wzfxydxc.exepid process 532 wzfxydxc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exewzfxydxc.exedescription pid process target process PID 4484 wrote to memory of 532 4484 8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exe wzfxydxc.exe PID 4484 wrote to memory of 532 4484 8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exe wzfxydxc.exe PID 4484 wrote to memory of 532 4484 8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exe wzfxydxc.exe PID 532 wrote to memory of 5060 532 wzfxydxc.exe wzfxydxc.exe PID 532 wrote to memory of 5060 532 wzfxydxc.exe wzfxydxc.exe PID 532 wrote to memory of 5060 532 wzfxydxc.exe wzfxydxc.exe PID 532 wrote to memory of 5060 532 wzfxydxc.exe wzfxydxc.exe PID 532 wrote to memory of 5060 532 wzfxydxc.exe wzfxydxc.exe PID 532 wrote to memory of 5060 532 wzfxydxc.exe wzfxydxc.exe PID 532 wrote to memory of 5060 532 wzfxydxc.exe wzfxydxc.exe PID 532 wrote to memory of 5060 532 wzfxydxc.exe wzfxydxc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exe"C:\Users\Admin\AppData\Local\Temp\8addc46a1e996f780e9b2725a82cc2c6d59ce1f36cd1ba65167c92c933aacd19.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\wzfxydxc.exeC:\Users\Admin\AppData\Local\Temp\wzfxydxc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\wzfxydxc.exeC:\Users\Admin\AppData\Local\Temp\wzfxydxc.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5cc2e61b0677295f97ee463e1232fdabf
SHA15f26d5ee905618aca1be68753afca20af0b3421f
SHA2568ea10fb9e21297828f13e6539fd9ce30fc5c72cf87d25563e0fbb58958c08780
SHA512c88d4c9b35e7e0f9c433ab01f93d206832673c3420320cba083aac99ed3476073dee245a669f7182a6ca529ea5d25dc3e5439a1a368c94de47a7e70b04e6fd7d
-
Filesize
48KB
MD515774c7824d086b14d25f95f6614adda
SHA15f2c2490b5dca7130e0024f7241e9ae98727d878
SHA2568ff9603d9a1084f9f8b2e5e4e05719e76494f2183ec013ae606e74c5108bf7bb
SHA512f9715dcc1e4dcf3973f46d0d585049dc8350a4152606d57666d046e0bfbc1f3b935d84dadf092d9c4dd594e59b5099931473ac83040bf9d4498aa8f0c4d62f74
-
Filesize
48KB
MD515774c7824d086b14d25f95f6614adda
SHA15f2c2490b5dca7130e0024f7241e9ae98727d878
SHA2568ff9603d9a1084f9f8b2e5e4e05719e76494f2183ec013ae606e74c5108bf7bb
SHA512f9715dcc1e4dcf3973f46d0d585049dc8350a4152606d57666d046e0bfbc1f3b935d84dadf092d9c4dd594e59b5099931473ac83040bf9d4498aa8f0c4d62f74
-
Filesize
48KB
MD515774c7824d086b14d25f95f6614adda
SHA15f2c2490b5dca7130e0024f7241e9ae98727d878
SHA2568ff9603d9a1084f9f8b2e5e4e05719e76494f2183ec013ae606e74c5108bf7bb
SHA512f9715dcc1e4dcf3973f46d0d585049dc8350a4152606d57666d046e0bfbc1f3b935d84dadf092d9c4dd594e59b5099931473ac83040bf9d4498aa8f0c4d62f74