Analysis

  • max time kernel
    245s
  • max time network
    332s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 11:42

General

  • Target

    f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe

  • Size

    4.9MB

  • MD5

    db8a38379ad5247898089092cde44b15

  • SHA1

    69cc18b0fffa49bbf447fc4efd7a0103493a7147

  • SHA256

    f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9

  • SHA512

    b4499968c60413b022421393ed499d762d4b08d62cc8062a7ab9664d81f7357b22cf9557f69a423b68868a9556337695d7c9c760cea4e9deaaa8a08dad0432b7

  • SSDEEP

    98304:LtrbTA1fxCJ3JpUn1mWturpGwGsq1ixQHP542VjFL05FmO:Rc1W5an1yrUKq1s65TVjt0mO

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe
    "C:\Users\Admin\AppData\Local\Temp\f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:472
    • C:\Users\Admin\AppData\Local\Temp\f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe
      "C:\Users\Admin\AppData\Local\Temp\f59f85c31850ad4e7a2014ca0d49d59ab86e452a9e2ca8d1517bd5990a01d6d9.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:712
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • Modifies registry key
          PID:2004
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c netstat -n >"C:\Users\Admin\AppData\Roaming\PoseidonC\OB.sete"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Windows\SysWOW64\NETSTAT.EXE
          netstat -n
          4⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:668
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c netstat -n >"C:\Users\Admin\AppData\Roaming\PoseidonC\OB.sete"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Windows\SysWOW64\NETSTAT.EXE
          netstat -n
          4⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:824
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1216
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1332

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\PoseidonC\OB.sete

        Filesize

        354B

        MD5

        bad5d1ce1510d3895e7a1676466511cd

        SHA1

        5651bf9f8a07feb769f8451dc2294130303cf30e

        SHA256

        cb9c021c3fb7c1e0552c03014c10ba7d0472890dbef87a7f3599cfa09d530b60

        SHA512

        9ab103f95cac8f984bf537b043df4c13a07b1e43a744d1f2aec7ee309b6dfdb0ec5c7693a54ef6c8eafe3fc49b1aeed545da4a9bb2425b253addd62479941ebb

      • C:\Users\Admin\AppData\Roaming\PoseidonC\OB.sete

        Filesize

        354B

        MD5

        bad5d1ce1510d3895e7a1676466511cd

        SHA1

        5651bf9f8a07feb769f8451dc2294130303cf30e

        SHA256

        cb9c021c3fb7c1e0552c03014c10ba7d0472890dbef87a7f3599cfa09d530b60

        SHA512

        9ab103f95cac8f984bf537b043df4c13a07b1e43a744d1f2aec7ee309b6dfdb0ec5c7693a54ef6c8eafe3fc49b1aeed545da4a9bb2425b253addd62479941ebb

      • memory/472-54-0x0000000075FF1000-0x0000000075FF3000-memory.dmp

        Filesize

        8KB

      • memory/668-67-0x0000000000000000-mapping.dmp

      • memory/712-64-0x0000000000000000-mapping.dmp

      • memory/780-58-0x0000000000B560B0-mapping.dmp

      • memory/780-62-0x00000000008C0000-0x0000000000D19000-memory.dmp

        Filesize

        4.3MB

      • memory/780-63-0x00000000008C0000-0x0000000000D19000-memory.dmp

        Filesize

        4.3MB

      • memory/780-59-0x00000000008C0000-0x0000000000D19000-memory.dmp

        Filesize

        4.3MB

      • memory/780-61-0x00000000008C0000-0x0000000000D19000-memory.dmp

        Filesize

        4.3MB

      • memory/780-57-0x00000000008C0000-0x0000000000D19000-memory.dmp

        Filesize

        4.3MB

      • memory/780-55-0x00000000008C0000-0x0000000000D19000-memory.dmp

        Filesize

        4.3MB

      • memory/780-73-0x00000000008C0000-0x0000000000D19000-memory.dmp

        Filesize

        4.3MB

      • memory/824-71-0x0000000000000000-mapping.dmp

      • memory/940-70-0x0000000000000000-mapping.dmp

      • memory/1216-69-0x000007FEFC4B1000-0x000007FEFC4B3000-memory.dmp

        Filesize

        8KB

      • memory/1888-66-0x0000000000000000-mapping.dmp

      • memory/2004-65-0x0000000000000000-mapping.dmp