Analysis
-
max time kernel
161s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 08:07
Static task
static1
Behavioral task
behavioral1
Sample
f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe
Resource
win10v2004-20220812-en
General
-
Target
f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe
-
Size
48KB
-
MD5
650dfd058e6e9e8d824f303a8c302ab7
-
SHA1
296069991585af3083b3b9f14374ed4196079932
-
SHA256
f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7
-
SHA512
57b832e58fe9a5d8503295051a75bc315730905fff8a9ab8118b95aa7694b6650f48ddc89977680e49dad79d35c6840670a86292bc09e25cffd87fbaf1203282
-
SSDEEP
768:+vSVkaHW2vCmE9YsynDBWhyme8wdf/mv8psLf7056cbT:u2vXEKWhymVqf/mv8psLj056cH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\\\27508.exe\" 5208257914" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,\"C:\\\\27508.exe\" 5208257914" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exepid process 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.execmd.execmd.exedescription pid process target process PID 1120 wrote to memory of 1268 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe cmd.exe PID 1120 wrote to memory of 1268 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe cmd.exe PID 1120 wrote to memory of 1268 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe cmd.exe PID 1120 wrote to memory of 1268 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe cmd.exe PID 1120 wrote to memory of 632 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe cmd.exe PID 1120 wrote to memory of 632 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe cmd.exe PID 1120 wrote to memory of 632 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe cmd.exe PID 1120 wrote to memory of 632 1120 f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe cmd.exe PID 1268 wrote to memory of 1704 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1704 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1704 1268 cmd.exe reg.exe PID 1268 wrote to memory of 1704 1268 cmd.exe reg.exe PID 632 wrote to memory of 1540 632 cmd.exe reg.exe PID 632 wrote to memory of 1540 632 cmd.exe reg.exe PID 632 wrote to memory of 1540 632 cmd.exe reg.exe PID 632 wrote to memory of 1540 632 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe"C:\Users\Admin\AppData\Local\Temp\f7ffd38677da5bb43132dca5b818ee0732522ca86fdfbc76525e1bb75375edb7.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "userinit.exe","\"C:\\27508.exe\" 5208257914" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "userinit.exe","\"C:\\27508.exe\" 5208257914" /f3⤵
- Modifies WinLogon for persistence
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "userinit.exe","\"C:\\27508.exe\" 5208257914" /f /reg:642⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "userinit.exe","\"C:\\27508.exe\" 5208257914" /f /reg:643⤵
- Modifies WinLogon for persistence
PID:1540