Analysis
-
max time kernel
102s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe
Resource
win10v2004-20221111-en
General
-
Target
fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe
-
Size
1.5MB
-
MD5
cb8d8874c16921af398bb52c67839973
-
SHA1
9271f5c7eeda4f91144c395f299f4f5fdc41d0bd
-
SHA256
fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765
-
SHA512
b5f93837c4cf0c3fa34c5b0c0a3fae98e1beaab0ab5408dec2eed8f348663bc06a551a56a2adfd5666dafc8d95c7ba5e24e118863ecf6a91b624f2fcfe15ebf5
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eG5:wcZC35VcOcmDcc6Cdb
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1384 set thread context of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1328 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1168 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 1168 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 1168 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 1168 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 1168 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1384 wrote to memory of 576 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 28 PID 1384 wrote to memory of 576 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 28 PID 1384 wrote to memory of 576 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 28 PID 1384 wrote to memory of 576 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 28 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 576 wrote to memory of 1328 576 cmd.exe 31 PID 576 wrote to memory of 1328 576 cmd.exe 31 PID 576 wrote to memory of 1328 576 cmd.exe 31 PID 576 wrote to memory of 1328 576 cmd.exe 31 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30 PID 1384 wrote to memory of 1168 1384 fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe"C:\Users\Admin\AppData\Local\Temp\fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:1328
-
-
-
C:\Users\Admin\AppData\Local\Temp\fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe"C:\Users\Admin\AppData\Local\Temp\fe4c82e5b1a9aad1116c3abaa93caeeffbf49c25ff126db16f2f09a7a588d765.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1168
-