Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 13:26
Static task
static1
Behavioral task
behavioral1
Sample
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe
Resource
win10v2004-20220812-en
General
-
Target
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe
-
Size
1.1MB
-
MD5
02daff1e68eb29b7f4bbf6cf8254478a
-
SHA1
5a61f408b0e6a04f30735f7aa62f023781d6a6aa
-
SHA256
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
-
SHA512
87c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb
-
SSDEEP
24576:m4lavt0LkLL9IMixoEgeahTPUQO7LbWp/Mq9MmCS:xkwkn9IMHeaxPOTWpkaPCS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
movie.exepid process 1292 movie.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1496 cmd.exe -
Loads dropped DLL 4 IoCs
Processes:
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exepid process 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
movie.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run movie.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\movie.exe" movie.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\movie.exe autoit_exe \Users\Admin\AppData\Roaming\movie.exe autoit_exe \Users\Admin\AppData\Roaming\movie.exe autoit_exe \Users\Admin\AppData\Roaming\movie.exe autoit_exe C:\Users\Admin\AppData\Roaming\movie.exe autoit_exe C:\Users\Admin\AppData\Roaming\movie.exe autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
Processes:
movie.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\movie.exe:Zone.Identifier:$DATA movie.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
movie.exepid process 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe 1292 movie.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.execmd.exedescription pid process target process PID 2040 wrote to memory of 1292 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe movie.exe PID 2040 wrote to memory of 1292 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe movie.exe PID 2040 wrote to memory of 1292 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe movie.exe PID 2040 wrote to memory of 1292 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe movie.exe PID 2040 wrote to memory of 1496 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe cmd.exe PID 2040 wrote to memory of 1496 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe cmd.exe PID 2040 wrote to memory of 1496 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe cmd.exe PID 2040 wrote to memory of 1496 2040 1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe cmd.exe PID 1496 wrote to memory of 340 1496 cmd.exe PING.EXE PID 1496 wrote to memory of 340 1496 cmd.exe PING.EXE PID 1496 wrote to memory of 340 1496 cmd.exe PING.EXE PID 1496 wrote to memory of 340 1496 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe"C:\Users\Admin\AppData\Local\Temp\1239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\movie.exe"C:\Users\Admin\AppData\Roaming\movie.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\scratch.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\PING.EXEping -n 0127.0.0.13⤵
- Runs ping.exe
PID:340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317B
MD5290e6421f725ebe199c949e3760586f7
SHA12dc22f43ebd7d35b41198b8553d03645bc4f5c94
SHA2565aeb23fa1135cd110438674f3c666436a2e9055e4b3d2b23bbf7ed7acf5c2408
SHA51228431a28ce0f16a8135ecec8bcaa51951c605516b389aa5eddd8237c20b79faf40fc388ddbf7083f076ea758616ce41177ea1ba86a5969a8c9e32e40b699b455
-
Filesize
1.1MB
MD502daff1e68eb29b7f4bbf6cf8254478a
SHA15a61f408b0e6a04f30735f7aa62f023781d6a6aa
SHA2561239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
SHA51287c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb
-
Filesize
1.1MB
MD502daff1e68eb29b7f4bbf6cf8254478a
SHA15a61f408b0e6a04f30735f7aa62f023781d6a6aa
SHA2561239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
SHA51287c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb
-
Filesize
1.1MB
MD502daff1e68eb29b7f4bbf6cf8254478a
SHA15a61f408b0e6a04f30735f7aa62f023781d6a6aa
SHA2561239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
SHA51287c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb
-
Filesize
1.1MB
MD502daff1e68eb29b7f4bbf6cf8254478a
SHA15a61f408b0e6a04f30735f7aa62f023781d6a6aa
SHA2561239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
SHA51287c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb
-
Filesize
1.1MB
MD502daff1e68eb29b7f4bbf6cf8254478a
SHA15a61f408b0e6a04f30735f7aa62f023781d6a6aa
SHA2561239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
SHA51287c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb
-
Filesize
1.1MB
MD502daff1e68eb29b7f4bbf6cf8254478a
SHA15a61f408b0e6a04f30735f7aa62f023781d6a6aa
SHA2561239b8f51a235237132abf7dd82dc13284b56913debed7140e2cb4f80cd75aee
SHA51287c61689accd3e114d99755a55cbac2755ca820ec775626edfb164bebfc69ef07e21fe44268696bece6f612e7c30ffc411f2d620dfcc95b2e82e61a1556d5cbb