Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:51
Static task
static1
Behavioral task
behavioral1
Sample
7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe
Resource
win10v2004-20220812-en
General
-
Target
7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe
-
Size
478KB
-
MD5
3346650620e7a2161f761bb9d1958220
-
SHA1
1c7e265e0a9c7cacc4f073f506279907d02ed6fb
-
SHA256
7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee
-
SHA512
a7f1ad5b86b89428518d6452d63e27fc2a26f30cb869e65ce1e5acb7b484f4ea0fb9bc4108655d80d9d13bcdc56527cfffd86b2f60a1bfd573dfa5694bde9d6a
-
SSDEEP
6144:bicL4qwxpzEaqcQMfx/o9JAKcQrdSTfXE1Sp2XyWOfevI0Fzm12qlw:bnUlbz3H/o99cOSTf0S2Xyk1f8w
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\esukixap = "C:\\Windows\\ogefyrul.exe" explorer.exe -
Processes:
7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exedescription pid process target process PID 784 set thread context of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 2028 set thread context of 936 2028 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe explorer.exe -
Drops file in Windows directory 2 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\ogefyrul.exe explorer.exe File created C:\Windows\ogefyrul.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1356 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 560 vssvc.exe Token: SeRestorePrivilege 560 vssvc.exe Token: SeAuditPrivilege 560 vssvc.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exeexplorer.exedescription pid process target process PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 784 wrote to memory of 2028 784 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe PID 2028 wrote to memory of 936 2028 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe explorer.exe PID 2028 wrote to memory of 936 2028 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe explorer.exe PID 2028 wrote to memory of 936 2028 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe explorer.exe PID 2028 wrote to memory of 936 2028 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe explorer.exe PID 2028 wrote to memory of 936 2028 7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe explorer.exe PID 936 wrote to memory of 1356 936 explorer.exe vssadmin.exe PID 936 wrote to memory of 1356 936 explorer.exe vssadmin.exe PID 936 wrote to memory of 1356 936 explorer.exe vssadmin.exe PID 936 wrote to memory of 1356 936 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe"C:\Users\Admin\AppData\Local\Temp\7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe"C:\Users\Admin\AppData\Local\Temp\7a0dc2d9d5c14e0869ef9caa240bc24d170130b5c5689ef1f83454e97a14feee.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:1356
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
478KB
MD595063b75f01b11000d62328e4d42da38
SHA110464acd2d4d4f3a53ad236fe73db928e2f5f663
SHA256f296f942d023579ceb4d6f4f3439486cf6523cd74175b396ce8112a2e792d7c1
SHA5123603ec1943306cd502d316bf782abd13877239c8b0bfef1815394954d6a84e65e84f321a614f5d32953a5ae4ac0cfe12532ae27ff684da3bdd647bfc04b0601c