Analysis
-
max time kernel
59s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 10:58
Static task
static1
Behavioral task
behavioral1
Sample
11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe
Resource
win10v2004-20220812-en
General
-
Target
11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe
-
Size
1.5MB
-
MD5
0d2ad44bbdc2e94bdfc5efebeb248c8e
-
SHA1
da4f7cfcdc8cc884e57d744419c2955a8e8941b2
-
SHA256
11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a
-
SHA512
414ca76dcf986ebb3b432389a507186b6613fef545bb3f6ad0cee03ccad8308f380183dd551b3624d2de272876f317d789740f61e7044cfec2881f50596f82bd
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGC:wcZC35VcOcmDcc6CdI
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 516 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 580 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 580 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 580 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 580 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 580 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1628 wrote to memory of 564 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 28 PID 1628 wrote to memory of 564 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 28 PID 1628 wrote to memory of 564 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 28 PID 1628 wrote to memory of 564 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 28 PID 564 wrote to memory of 516 564 cmd.exe 30 PID 564 wrote to memory of 516 564 cmd.exe 30 PID 564 wrote to memory of 516 564 cmd.exe 30 PID 564 wrote to memory of 516 564 cmd.exe 30 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31 PID 1628 wrote to memory of 580 1628 11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe"C:\Users\Admin\AppData\Local\Temp\11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:516
-
-
-
C:\Users\Admin\AppData\Local\Temp\11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe"C:\Users\Admin\AppData\Local\Temp\11ea3f3562cd91d9068e5ee6bc78906450e8365a9cf1b187074a68e94510c49a.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:580
-