Analysis
-
max time kernel
208s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe
Resource
win10v2004-20220812-en
General
-
Target
e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe
-
Size
3.3MB
-
MD5
4027e91cbc005b26ad9b0e16531b4d81
-
SHA1
8418fa6d9b1ed71cc89e1d251c0107fa8ddfa637
-
SHA256
e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7
-
SHA512
0e267960c23f3ef5eae4a75b698dc21395e11831a08a82defe43926588edb899d840b9e5f1a5c824f412cc666bd62ccc894338e55231023568191c1f96bdcccf
-
SSDEEP
49152:E9BfDauF3rt3g7GNBamkmmCwLtLV3viyKXtLGNWImgPIsxmHCpswILEtLv:EfTxzG7CwdV3vidSWHFCmLwv
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 948 reg64.exe 556 bot.exe 1332 tmm32.exe 1700 tmm32.exe -
Loads dropped DLL 10 IoCs
pid Process 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 948 reg64.exe 948 reg64.exe 1332 tmm32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run tmm32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\tmm32.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmm32.exe" tmm32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1332 set thread context of 1700 1332 tmm32.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe 1700 tmm32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1332 tmm32.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2004 wrote to memory of 948 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 28 PID 2004 wrote to memory of 948 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 28 PID 2004 wrote to memory of 948 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 28 PID 2004 wrote to memory of 948 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 28 PID 2004 wrote to memory of 948 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 28 PID 2004 wrote to memory of 948 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 28 PID 2004 wrote to memory of 948 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 28 PID 2004 wrote to memory of 556 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 29 PID 2004 wrote to memory of 556 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 29 PID 2004 wrote to memory of 556 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 29 PID 2004 wrote to memory of 556 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 29 PID 2004 wrote to memory of 556 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 29 PID 2004 wrote to memory of 556 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 29 PID 2004 wrote to memory of 556 2004 e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe 29 PID 948 wrote to memory of 1332 948 reg64.exe 30 PID 948 wrote to memory of 1332 948 reg64.exe 30 PID 948 wrote to memory of 1332 948 reg64.exe 30 PID 948 wrote to memory of 1332 948 reg64.exe 30 PID 948 wrote to memory of 1332 948 reg64.exe 30 PID 948 wrote to memory of 1332 948 reg64.exe 30 PID 948 wrote to memory of 1332 948 reg64.exe 30 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31 PID 1332 wrote to memory of 1700 1332 tmm32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe"C:\Users\Admin\AppData\Local\Temp\e421782098917c59e29746d2a423e7ed177eda28f79d8d40859ba96de9f657f7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\reg64.exe"C:\Users\Admin\AppData\Local\Temp\reg64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\tmm32.exe"C:\Users\Admin\AppData\Local\Temp\tmm32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\tmm32.exe"C:\Users\Admin\AppData\Local\Temp\tmm32.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bot.exe"C:\Users\Admin\AppData\Local\Temp\bot.exe"2⤵
- Executes dropped EXE
PID:556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD52464b4bf0871616c933bfe12f5b2ab71
SHA1561f70e457cb22fcbe344e4605be3ee9f2ddd606
SHA25665bf4a5ab8bd9e351c01a2a45eec3062e39717e6dc4694ed7c1f7b54f3d38f75
SHA5123cdbd672c92c0808e11197577564a53db1560065b45aa57aabe2a4df0c2c2aa93357762359d575a0bafb2750239dda26689d82135656e12ae749e85ccc1e400b
-
Filesize
525KB
MD5513d7b7802c59b1da771eaf8603dee9d
SHA18b6dc913f4fc7d20f68cd9dc123f74e5eb3a138a
SHA2562e666dc99f813f62d2f6caf7dc0b152863be2997852ab3e48cc24afe7e1c921f
SHA512dd0b2f591892741ae7b09d02a58d72021ad446af07274ff167db088622fa409d9ad7eba50807f33f15707d98bfb643f2953a2646819078ebdd985eb6bf34577c
-
Filesize
525KB
MD5513d7b7802c59b1da771eaf8603dee9d
SHA18b6dc913f4fc7d20f68cd9dc123f74e5eb3a138a
SHA2562e666dc99f813f62d2f6caf7dc0b152863be2997852ab3e48cc24afe7e1c921f
SHA512dd0b2f591892741ae7b09d02a58d72021ad446af07274ff167db088622fa409d9ad7eba50807f33f15707d98bfb643f2953a2646819078ebdd985eb6bf34577c
-
Filesize
24B
MD5708c2b4003fe7087c097b310c12682b5
SHA1fbb0d028cfb82c271f6114e165219fd9a8e9319a
SHA256eb5221bd93e012a2da8d8e63fd5efd04afd8114f1fd9c0842cde3220b4c49cdb
SHA512061b36583352fb72bf6a777f646f5d59671cdecb8cdf421011890c59dbc5976773288c6114b644ec36572db9f4ce4f19b668cc240ba52c14a9d50800e5e858f8
-
Filesize
620KB
MD5dcb0eecb3bce6375ccc4be7a020aa625
SHA17190ddeeb09857e19badf8a2d077fdbaad3a918b
SHA25674ede674fc2f9dec1aa9111e99f9b05317750c98a696bc0c816630deef05ec68
SHA512e37bb8d5f9a0f57bb1ea61e888c3dcafaf2849158f8e0645bb61b1f2fc1b22c66410da36ea49c51bb001970c08312a6a0bf5882863b3b076c376d8f50a5c7fed
-
Filesize
620KB
MD5dcb0eecb3bce6375ccc4be7a020aa625
SHA17190ddeeb09857e19badf8a2d077fdbaad3a918b
SHA25674ede674fc2f9dec1aa9111e99f9b05317750c98a696bc0c816630deef05ec68
SHA512e37bb8d5f9a0f57bb1ea61e888c3dcafaf2849158f8e0645bb61b1f2fc1b22c66410da36ea49c51bb001970c08312a6a0bf5882863b3b076c376d8f50a5c7fed
-
Filesize
620KB
MD5dcb0eecb3bce6375ccc4be7a020aa625
SHA17190ddeeb09857e19badf8a2d077fdbaad3a918b
SHA25674ede674fc2f9dec1aa9111e99f9b05317750c98a696bc0c816630deef05ec68
SHA512e37bb8d5f9a0f57bb1ea61e888c3dcafaf2849158f8e0645bb61b1f2fc1b22c66410da36ea49c51bb001970c08312a6a0bf5882863b3b076c376d8f50a5c7fed
-
Filesize
2.5MB
MD52464b4bf0871616c933bfe12f5b2ab71
SHA1561f70e457cb22fcbe344e4605be3ee9f2ddd606
SHA25665bf4a5ab8bd9e351c01a2a45eec3062e39717e6dc4694ed7c1f7b54f3d38f75
SHA5123cdbd672c92c0808e11197577564a53db1560065b45aa57aabe2a4df0c2c2aa93357762359d575a0bafb2750239dda26689d82135656e12ae749e85ccc1e400b
-
Filesize
2.5MB
MD52464b4bf0871616c933bfe12f5b2ab71
SHA1561f70e457cb22fcbe344e4605be3ee9f2ddd606
SHA25665bf4a5ab8bd9e351c01a2a45eec3062e39717e6dc4694ed7c1f7b54f3d38f75
SHA5123cdbd672c92c0808e11197577564a53db1560065b45aa57aabe2a4df0c2c2aa93357762359d575a0bafb2750239dda26689d82135656e12ae749e85ccc1e400b
-
Filesize
2.5MB
MD52464b4bf0871616c933bfe12f5b2ab71
SHA1561f70e457cb22fcbe344e4605be3ee9f2ddd606
SHA25665bf4a5ab8bd9e351c01a2a45eec3062e39717e6dc4694ed7c1f7b54f3d38f75
SHA5123cdbd672c92c0808e11197577564a53db1560065b45aa57aabe2a4df0c2c2aa93357762359d575a0bafb2750239dda26689d82135656e12ae749e85ccc1e400b
-
Filesize
2.5MB
MD52464b4bf0871616c933bfe12f5b2ab71
SHA1561f70e457cb22fcbe344e4605be3ee9f2ddd606
SHA25665bf4a5ab8bd9e351c01a2a45eec3062e39717e6dc4694ed7c1f7b54f3d38f75
SHA5123cdbd672c92c0808e11197577564a53db1560065b45aa57aabe2a4df0c2c2aa93357762359d575a0bafb2750239dda26689d82135656e12ae749e85ccc1e400b
-
Filesize
525KB
MD5513d7b7802c59b1da771eaf8603dee9d
SHA18b6dc913f4fc7d20f68cd9dc123f74e5eb3a138a
SHA2562e666dc99f813f62d2f6caf7dc0b152863be2997852ab3e48cc24afe7e1c921f
SHA512dd0b2f591892741ae7b09d02a58d72021ad446af07274ff167db088622fa409d9ad7eba50807f33f15707d98bfb643f2953a2646819078ebdd985eb6bf34577c
-
Filesize
525KB
MD5513d7b7802c59b1da771eaf8603dee9d
SHA18b6dc913f4fc7d20f68cd9dc123f74e5eb3a138a
SHA2562e666dc99f813f62d2f6caf7dc0b152863be2997852ab3e48cc24afe7e1c921f
SHA512dd0b2f591892741ae7b09d02a58d72021ad446af07274ff167db088622fa409d9ad7eba50807f33f15707d98bfb643f2953a2646819078ebdd985eb6bf34577c
-
Filesize
525KB
MD5513d7b7802c59b1da771eaf8603dee9d
SHA18b6dc913f4fc7d20f68cd9dc123f74e5eb3a138a
SHA2562e666dc99f813f62d2f6caf7dc0b152863be2997852ab3e48cc24afe7e1c921f
SHA512dd0b2f591892741ae7b09d02a58d72021ad446af07274ff167db088622fa409d9ad7eba50807f33f15707d98bfb643f2953a2646819078ebdd985eb6bf34577c
-
Filesize
620KB
MD5dcb0eecb3bce6375ccc4be7a020aa625
SHA17190ddeeb09857e19badf8a2d077fdbaad3a918b
SHA25674ede674fc2f9dec1aa9111e99f9b05317750c98a696bc0c816630deef05ec68
SHA512e37bb8d5f9a0f57bb1ea61e888c3dcafaf2849158f8e0645bb61b1f2fc1b22c66410da36ea49c51bb001970c08312a6a0bf5882863b3b076c376d8f50a5c7fed
-
Filesize
620KB
MD5dcb0eecb3bce6375ccc4be7a020aa625
SHA17190ddeeb09857e19badf8a2d077fdbaad3a918b
SHA25674ede674fc2f9dec1aa9111e99f9b05317750c98a696bc0c816630deef05ec68
SHA512e37bb8d5f9a0f57bb1ea61e888c3dcafaf2849158f8e0645bb61b1f2fc1b22c66410da36ea49c51bb001970c08312a6a0bf5882863b3b076c376d8f50a5c7fed
-
Filesize
620KB
MD5dcb0eecb3bce6375ccc4be7a020aa625
SHA17190ddeeb09857e19badf8a2d077fdbaad3a918b
SHA25674ede674fc2f9dec1aa9111e99f9b05317750c98a696bc0c816630deef05ec68
SHA512e37bb8d5f9a0f57bb1ea61e888c3dcafaf2849158f8e0645bb61b1f2fc1b22c66410da36ea49c51bb001970c08312a6a0bf5882863b3b076c376d8f50a5c7fed