Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 10:34
Static task
static1
Behavioral task
behavioral1
Sample
cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe
Resource
win10v2004-20221111-en
General
-
Target
cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe
-
Size
1.5MB
-
MD5
4b5c23af31f55dabb9b799a0ecdf0434
-
SHA1
83b812dff94367ce3dce5b493df299b6f5a2a5f1
-
SHA256
cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2
-
SHA512
1f5f3b32f96b78de1d7e3da6e1cc5842d184b3e86b05b0b3fa70d5d92bcd091cc773f70829eb69e85faa32ca0f405bfac07caf573213ca05d96c495947c9e3ef
-
SSDEEP
24576:3pa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eG:AcZC35VcOcmDcc6Cd
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 960 set thread context of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 904 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 912 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 912 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 912 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 912 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 912 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 960 wrote to memory of 1992 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 27 PID 960 wrote to memory of 1992 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 27 PID 960 wrote to memory of 1992 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 27 PID 960 wrote to memory of 1992 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 27 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 1992 wrote to memory of 904 1992 cmd.exe 30 PID 1992 wrote to memory of 904 1992 cmd.exe 30 PID 1992 wrote to memory of 904 1992 cmd.exe 30 PID 1992 wrote to memory of 904 1992 cmd.exe 30 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29 PID 960 wrote to memory of 912 960 cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe"C:\Users\Admin\AppData\Local\Temp\cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe"C:\Users\Admin\AppData\Local\Temp\cf1e2e6426eddc6b45203ec4ba5626a5873af40eac5abf506376737e1b8709b2.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:912
-