Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe
Resource
win10v2004-20221111-en
General
-
Target
3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe
-
Size
2.0MB
-
MD5
504a844c869ee157494cd95e6f2ccd30
-
SHA1
f0b2d97d7abc916473211141816df126eb978cee
-
SHA256
3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939
-
SHA512
b0c8142fe292ccb6fb1eb533188fa0594e09ee40c9ac083313a4ddb5e2927c55fb14d2eed0189bbe2dd7ef4cca37821353c817fcdc2fefad0bd5b94b5ccab9ab
-
SSDEEP
49152:gDwk0y1heAeC0c+21ACCZtgcZEomhthlpR:jkgC0c3ACCZKomhtxR
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Wine 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Loads dropped DLL 1 IoCs
pid Process 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe Token: SeDebugPrivilege 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe Token: SeDebugPrivilege 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1304 wrote to memory of 368 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 5 PID 1304 wrote to memory of 368 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 5 PID 1304 wrote to memory of 368 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 5 PID 1304 wrote to memory of 368 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 5 PID 1304 wrote to memory of 368 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 5 PID 1304 wrote to memory of 368 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 5 PID 1304 wrote to memory of 384 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 4 PID 1304 wrote to memory of 384 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 4 PID 1304 wrote to memory of 384 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 4 PID 1304 wrote to memory of 384 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 4 PID 1304 wrote to memory of 384 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 4 PID 1304 wrote to memory of 384 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 4 PID 1304 wrote to memory of 420 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 3 PID 1304 wrote to memory of 420 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 3 PID 1304 wrote to memory of 420 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 3 PID 1304 wrote to memory of 420 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 3 PID 1304 wrote to memory of 420 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 3 PID 1304 wrote to memory of 420 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 3 PID 1304 wrote to memory of 464 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 2 PID 1304 wrote to memory of 464 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 2 PID 1304 wrote to memory of 464 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 2 PID 1304 wrote to memory of 464 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 2 PID 1304 wrote to memory of 464 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 2 PID 1304 wrote to memory of 464 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 2 PID 1304 wrote to memory of 480 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1 PID 1304 wrote to memory of 480 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1 PID 1304 wrote to memory of 480 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1 PID 1304 wrote to memory of 480 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1 PID 1304 wrote to memory of 480 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1 PID 1304 wrote to memory of 480 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 1 PID 1304 wrote to memory of 488 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 24 PID 1304 wrote to memory of 488 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 24 PID 1304 wrote to memory of 488 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 24 PID 1304 wrote to memory of 488 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 24 PID 1304 wrote to memory of 488 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 24 PID 1304 wrote to memory of 488 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 24 PID 1304 wrote to memory of 588 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 23 PID 1304 wrote to memory of 588 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 23 PID 1304 wrote to memory of 588 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 23 PID 1304 wrote to memory of 588 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 23 PID 1304 wrote to memory of 588 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 23 PID 1304 wrote to memory of 588 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 23 PID 1304 wrote to memory of 664 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 22 PID 1304 wrote to memory of 664 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 22 PID 1304 wrote to memory of 664 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 22 PID 1304 wrote to memory of 664 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 22 PID 1304 wrote to memory of 664 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 22 PID 1304 wrote to memory of 664 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 22 PID 1304 wrote to memory of 748 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 21 PID 1304 wrote to memory of 748 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 21 PID 1304 wrote to memory of 748 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 21 PID 1304 wrote to memory of 748 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 21 PID 1304 wrote to memory of 748 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 21 PID 1304 wrote to memory of 748 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 21 PID 1304 wrote to memory of 804 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 7 PID 1304 wrote to memory of 804 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 7 PID 1304 wrote to memory of 804 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 7 PID 1304 wrote to memory of 804 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 7 PID 1304 wrote to memory of 804 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 7 PID 1304 wrote to memory of 804 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 7 PID 1304 wrote to memory of 844 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 20 PID 1304 wrote to memory of 844 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 20 PID 1304 wrote to memory of 844 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 20 PID 1304 wrote to memory of 844 1304 3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe 20
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1176
-
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:792
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1724
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1112
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1056
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:288
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:340
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:844
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:748
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:664
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1876
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe"C:\Users\Admin\AppData\Local\Temp\3fce2e995b012f661a59fda9609e5eb546236aa941a1609c04dacab658050939.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD57c0415db33190179697196004e57d7c4
SHA108490854f84d7a8034a6945ff146d4862b15b5a7
SHA256aa058b89e25c14072acfac4f9159b7d74b20955e3940088e1037d87ca90d9ec1
SHA512dfd070b4ac5686510251be2564af7cc361246234808b0cb6537ea80e0d3717c061f90c0d4044c7e16d5d875def730ed0ed56ba3d4f7dd580dbdf9e7aab7dd1b7