Analysis
-
max time kernel
149s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe
Resource
win10v2004-20221111-en
General
-
Target
a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe
-
Size
452KB
-
MD5
88140b8a47b523da3f16de466e6ddbd7
-
SHA1
889dfdd52e48616862f48428e5fcb145d9a88255
-
SHA256
a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635
-
SHA512
d6e7fe3dbbf75745ec4da3371051d3b12a0677f8d20b28487b9ba017c19be758d561434ff8b6be1def6984fb5c83646d44f8b9d0ea09e2aa96d5eef6bb399452
-
SSDEEP
12288:KFhlFYQMvgPhzLuvBszuKmx+Dj3Avzxenf4/41:KrlyQJzLuQu/+/3Yzxenf4g
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\SunJava\\JavaUpdata.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1724 set thread context of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1264 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1264 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 1264 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 28 PID 1724 wrote to memory of 580 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 29 PID 1724 wrote to memory of 580 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 29 PID 1724 wrote to memory of 580 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 29 PID 1724 wrote to memory of 580 1724 a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe 29 PID 580 wrote to memory of 676 580 cmd.exe 31 PID 580 wrote to memory of 676 580 cmd.exe 31 PID 580 wrote to memory of 676 580 cmd.exe 31 PID 580 wrote to memory of 676 580 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"C:\Users\Admin\AppData\Local\Temp\a4f3f4ffb7e625b76cc509b7c49d98669f0e0f5b3dde5b241d1b30c3d51d0635.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1264
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Roaming\SunJava\JavaUpdata.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v shell /t REG_SZ /d explorer.exe,"C:\Users\Admin\AppData\Roaming\SunJava\JavaUpdata.exe"3⤵
- Modifies WinLogon for persistence
PID:676
-
-