Analysis
-
max time kernel
45s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 10:46
Static task
static1
Behavioral task
behavioral1
Sample
717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe
Resource
win10v2004-20220812-en
General
-
Target
717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe
-
Size
1.5MB
-
MD5
f91c4e92d892e7f886ab7e42701a3426
-
SHA1
fd82d7112e6b69876a4d13fbda9c913435c9fb72
-
SHA256
717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311
-
SHA512
8e46ecf8c7369f33297116f634d71e4bfa8b88c1af4d72bc8040cb4c99a302e9819aa42a8be322d280021757ed09c1a1af884d0fecabcd97109e550626d00d48
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eGe:wcZC35VcOcmDcc6CdI
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1600 set thread context of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 688 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1332 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 1332 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 1332 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 1332 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 1332 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1600 wrote to memory of 852 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 27 PID 1600 wrote to memory of 852 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 27 PID 1600 wrote to memory of 852 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 27 PID 1600 wrote to memory of 852 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 27 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 852 wrote to memory of 688 852 cmd.exe 30 PID 852 wrote to memory of 688 852 cmd.exe 30 PID 852 wrote to memory of 688 852 cmd.exe 30 PID 852 wrote to memory of 688 852 cmd.exe 30 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29 PID 1600 wrote to memory of 1332 1600 717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe"C:\Users\Admin\AppData\Local\Temp\717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:688
-
-
-
C:\Users\Admin\AppData\Local\Temp\717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe"C:\Users\Admin\AppData\Local\Temp\717f0e27d80a58d7cd9dbba4460efce546c68e6cd5e17e6bc604e0f596b7e311.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1332
-