Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 10:36
Static task
static1
Behavioral task
behavioral1
Sample
c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe
Resource
win10v2004-20220812-en
General
-
Target
c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe
-
Size
1.5MB
-
MD5
4b456d383b908bd831c55f759fc63e5d
-
SHA1
3c029bd2335ccb3221fb10a2c73fb4ece4bfcb6b
-
SHA256
c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f
-
SHA512
7e5c087e58fba1923804fb981dd6031bd91130f0a08a391f45647f7775742bdf85d72ccad513f6c2156eb728d17f4124777de98a193eb57e60b2b656c1b3e2e7
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eG+:wcZC35VcOcmDcc6CdI
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1764 set thread context of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1196 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 944 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 944 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 944 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 944 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 944 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1256 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 28 PID 1764 wrote to memory of 1256 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 28 PID 1764 wrote to memory of 1256 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 28 PID 1764 wrote to memory of 1256 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 28 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1256 wrote to memory of 1196 1256 cmd.exe 31 PID 1256 wrote to memory of 1196 1256 cmd.exe 31 PID 1256 wrote to memory of 1196 1256 cmd.exe 31 PID 1256 wrote to memory of 1196 1256 cmd.exe 31 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30 PID 1764 wrote to memory of 944 1764 c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe"C:\Users\Admin\AppData\Local\Temp\c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:1196
-
-
-
C:\Users\Admin\AppData\Local\Temp\c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe"C:\Users\Admin\AppData\Local\Temp\c0017ec7b8329e011f6dea666897f23fc9788853c0df3652b609d3395c977c0f.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:944
-