Analysis
-
max time kernel
249s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe
Resource
win10v2004-20221111-en
General
-
Target
0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe
-
Size
1.5MB
-
MD5
c226c465911a791e6a6a1fa84427e625
-
SHA1
3085ff35b0dfba45bef2d5bc8bd683f5e941a590
-
SHA256
0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616
-
SHA512
e82fe6abcdac5aba589c0fa0a21076b3d8e503f244d89b8f6de4aa97e61fb99043c9bc321ae9ed268c414fa85c8817af52711bce32647626b582a9ca1c10da3e
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGY:wcZC35VcOcmDcc6Cd2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1688 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 832 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 832 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 832 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 832 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 832 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1840 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 28 PID 1940 wrote to memory of 1840 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 28 PID 1940 wrote to memory of 1840 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 28 PID 1940 wrote to memory of 1840 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 28 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1840 wrote to memory of 1688 1840 cmd.exe 31 PID 1840 wrote to memory of 1688 1840 cmd.exe 31 PID 1840 wrote to memory of 1688 1840 cmd.exe 31 PID 1840 wrote to memory of 1688 1840 cmd.exe 31 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30 PID 1940 wrote to memory of 832 1940 0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe"C:\Users\Admin\AppData\Local\Temp\0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:1688
-
-
-
C:\Users\Admin\AppData\Local\Temp\0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe"C:\Users\Admin\AppData\Local\Temp\0e0717d2f12fd097e7f535679c8761b7b074057661665dcf7788deaa91902616.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:832
-