Analysis
-
max time kernel
303s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 17:30
Static task
static1
Behavioral task
behavioral1
Sample
891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe
Resource
win10v2004-20221111-en
General
-
Target
891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe
-
Size
321KB
-
MD5
e7b3076df23c41b827181a3e0ae332c2
-
SHA1
8bb243da0136ec6b37f5643b200fe00f73f6dcc6
-
SHA256
891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff
-
SHA512
b68c93e1824592fc6a1395947f20624e8f6c953e07eba83fe2200a8f41cfd964c8776a78affeaeb4f85475772cf2c6604b6f1f2a6f61f410e4c95a8030f28dad
-
SSDEEP
6144:v9vpsmGL4qibH3Lk7DkDRHBg186rdLE+ADoaPxI0:vn7GOviDklHBotdLyU+I
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\vjOguLpKtk = "C:\\Users\\Admin\\AppData\\Roaming\\JjqmADVl\\IAxqMI9.exe.lnk" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 584 set thread context of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe Token: SeDebugPrivilege 1560 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1560 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 584 wrote to memory of 1800 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 28 PID 584 wrote to memory of 1800 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 28 PID 584 wrote to memory of 1800 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 28 PID 584 wrote to memory of 1800 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 28 PID 1800 wrote to memory of 1796 1800 cmd.exe 30 PID 1800 wrote to memory of 1796 1800 cmd.exe 30 PID 1800 wrote to memory of 1796 1800 cmd.exe 30 PID 1800 wrote to memory of 1796 1800 cmd.exe 30 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31 PID 584 wrote to memory of 1560 584 891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe"C:\Users\Admin\AppData\Local\Temp\891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "vjOguLpKtk" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\JjqmADVl\IAxqMI9.exe.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "vjOguLpKtk" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\JjqmADVl\IAxqMI9.exe.lnk"3⤵
- Adds Run key to start application
PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe"C:\Users\Admin\AppData\Local\Temp\891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1560
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD5e7b3076df23c41b827181a3e0ae332c2
SHA18bb243da0136ec6b37f5643b200fe00f73f6dcc6
SHA256891ee3061ee23dd04daf031e3c5e5efdbf852def4bc05126a5deafd797912eff
SHA512b68c93e1824592fc6a1395947f20624e8f6c953e07eba83fe2200a8f41cfd964c8776a78affeaeb4f85475772cf2c6604b6f1f2a6f61f410e4c95a8030f28dad