Analysis
-
max time kernel
44s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe
Resource
win10v2004-20221111-en
General
-
Target
0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe
-
Size
1.5MB
-
MD5
c518467781344ec2a751ab1a7410ad5d
-
SHA1
3a94ba53d128b67751dce8d3216a423d55d00eb3
-
SHA256
0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8
-
SHA512
df6296b263de9afef2ced93dd7e807f57dd92e9330dc0f45da1be2a38aaff6876a0324e363b46a4f6603638199272ef6cbdae3a912b8532ab53c1961a58fb8d6
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGJ:wcZC35VcOcmDcc6Cdf
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 972 set thread context of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 376 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1148 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 1148 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 1148 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 1148 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 1148 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 972 wrote to memory of 1028 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 28 PID 972 wrote to memory of 1028 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 28 PID 972 wrote to memory of 1028 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 28 PID 972 wrote to memory of 1028 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 28 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 1028 wrote to memory of 376 1028 cmd.exe 31 PID 1028 wrote to memory of 376 1028 cmd.exe 31 PID 1028 wrote to memory of 376 1028 cmd.exe 31 PID 1028 wrote to memory of 376 1028 cmd.exe 31 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30 PID 972 wrote to memory of 1148 972 0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe"C:\Users\Admin\AppData\Local\Temp\0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:376
-
-
-
C:\Users\Admin\AppData\Local\Temp\0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe"C:\Users\Admin\AppData\Local\Temp\0c1e130ff8aa5352dc9ca722d2beb26dbe508b271ea1c3a8c6c1945591621ed8.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1148
-