Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe
Resource
win10v2004-20220812-en
General
-
Target
4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe
-
Size
93KB
-
MD5
0d70bfb77e3ddf3af6d6717abc780e11
-
SHA1
580ba59be674815882dd5dd4038b1b409e63da46
-
SHA256
4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91
-
SHA512
5485236ae4bd1931e3b7f72cc0fa9ad0d4c9178712c438f14d2513d3bb4e261dcccb25982a6a97e8e6258f4e33597383b9c0f948aedc73a846434375a9d61d76
-
SSDEEP
1536:4ESHFJ957YwFiJzco0S1XR9aKR5/i+jGJPj7Q/LvSzMiUDQWI/Ax5ppgYF03zXaj:VkHxiNHAKR5/5jGBw2nux5ppgYeXavb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1992 Server.exe 520 csrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1316 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e101a39ab5de59589562aa0ff3295ba5.exe csrss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e101a39ab5de59589562aa0ff3295ba5.exe csrss.exe -
Loads dropped DLL 2 IoCs
pid Process 1696 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe 1992 Server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\e101a39ab5de59589562aa0ff3295ba5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\csrss.exe\" .." csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\e101a39ab5de59589562aa0ff3295ba5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\csrss.exe\" .." csrss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe 520 csrss.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1696 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe Token: 33 1696 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe Token: SeIncBasePriorityPrivilege 1696 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe Token: SeDebugPrivilege 520 csrss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1992 1696 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe 27 PID 1696 wrote to memory of 1992 1696 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe 27 PID 1696 wrote to memory of 1992 1696 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe 27 PID 1696 wrote to memory of 1992 1696 4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe 27 PID 1992 wrote to memory of 520 1992 Server.exe 28 PID 1992 wrote to memory of 520 1992 Server.exe 28 PID 1992 wrote to memory of 520 1992 Server.exe 28 PID 1992 wrote to memory of 520 1992 Server.exe 28 PID 520 wrote to memory of 1316 520 csrss.exe 29 PID 520 wrote to memory of 1316 520 csrss.exe 29 PID 520 wrote to memory of 1316 520 csrss.exe 29 PID 520 wrote to memory of 1316 520 csrss.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe"C:\Users\Admin\AppData\Local\Temp\4e665e0a12c6b7a73a337387db8618cca6a3ed03a34878bb2e188eead91bda91.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\csrss.exe"C:\Users\Admin\AppData\Local\Temp\csrss.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\csrss.exe" "csrss.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:1316
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5cbd44cf5c94bdd7c5865c74fc58b5936
SHA115a4a4da51cafab3f42ecbc47602cb4d5ec9b1aa
SHA2562600db0f647f84e3540b73e3ef5f8594064b71e837c226f0d71ba8f4d2cb1440
SHA512cc601c04854c714faad619373c5a8cfc4c5c078fcd9f6aa625fe0d4b580bb0883ae9d37d03b0bfcabbebe5da288808a1013de8efa7045e78fcfc6b29b9cd7963
-
Filesize
28KB
MD5cbd44cf5c94bdd7c5865c74fc58b5936
SHA115a4a4da51cafab3f42ecbc47602cb4d5ec9b1aa
SHA2562600db0f647f84e3540b73e3ef5f8594064b71e837c226f0d71ba8f4d2cb1440
SHA512cc601c04854c714faad619373c5a8cfc4c5c078fcd9f6aa625fe0d4b580bb0883ae9d37d03b0bfcabbebe5da288808a1013de8efa7045e78fcfc6b29b9cd7963
-
Filesize
28KB
MD5cbd44cf5c94bdd7c5865c74fc58b5936
SHA115a4a4da51cafab3f42ecbc47602cb4d5ec9b1aa
SHA2562600db0f647f84e3540b73e3ef5f8594064b71e837c226f0d71ba8f4d2cb1440
SHA512cc601c04854c714faad619373c5a8cfc4c5c078fcd9f6aa625fe0d4b580bb0883ae9d37d03b0bfcabbebe5da288808a1013de8efa7045e78fcfc6b29b9cd7963
-
Filesize
28KB
MD5cbd44cf5c94bdd7c5865c74fc58b5936
SHA115a4a4da51cafab3f42ecbc47602cb4d5ec9b1aa
SHA2562600db0f647f84e3540b73e3ef5f8594064b71e837c226f0d71ba8f4d2cb1440
SHA512cc601c04854c714faad619373c5a8cfc4c5c078fcd9f6aa625fe0d4b580bb0883ae9d37d03b0bfcabbebe5da288808a1013de8efa7045e78fcfc6b29b9cd7963
-
Filesize
712B
MD59b54ad3fe6241a2a08953fbea904a98d
SHA181d6b676cc3d69e5e0fd3ca4be4dac3bb0c397ad
SHA256e104c2763d19e233014eb3e0cfa78a817f760b73d007f7866bae26ce91fbc1fa
SHA51297d4c9445d81ba619f3d30567f30ed2f67df756ee9ff2e8ae15efdf3236d4cb9b803fe19be13b33501e5e368c3d5d893aa9460a250c39fe3c709433c0eeb5473
-
Filesize
28KB
MD5cbd44cf5c94bdd7c5865c74fc58b5936
SHA115a4a4da51cafab3f42ecbc47602cb4d5ec9b1aa
SHA2562600db0f647f84e3540b73e3ef5f8594064b71e837c226f0d71ba8f4d2cb1440
SHA512cc601c04854c714faad619373c5a8cfc4c5c078fcd9f6aa625fe0d4b580bb0883ae9d37d03b0bfcabbebe5da288808a1013de8efa7045e78fcfc6b29b9cd7963
-
Filesize
28KB
MD5cbd44cf5c94bdd7c5865c74fc58b5936
SHA115a4a4da51cafab3f42ecbc47602cb4d5ec9b1aa
SHA2562600db0f647f84e3540b73e3ef5f8594064b71e837c226f0d71ba8f4d2cb1440
SHA512cc601c04854c714faad619373c5a8cfc4c5c078fcd9f6aa625fe0d4b580bb0883ae9d37d03b0bfcabbebe5da288808a1013de8efa7045e78fcfc6b29b9cd7963