Analysis
-
max time kernel
151s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
Resource
win10v2004-20220812-en
General
-
Target
48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe
-
Size
78KB
-
MD5
bc1883b07b47423bd30645e54db4775c
-
SHA1
2b96b8027083c5c44189ac03bafcc71df82a8ee1
-
SHA256
48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
-
SHA512
6185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e
-
SSDEEP
1536:Kgzoa0BgdObHOjEb+96omECPxuXfDZEEkU3rHt81Hqf:Lzoa0yQnOhmEHCEkgry1H
Malware Config
Extracted
tofsee
185.4.227.76
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1504 cclkwivx.exe 1308 cclkwivx.exe -
Deletes itself 1 IoCs
pid Process 396 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\cclkwivx.exe\"" 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1692 set thread context of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1504 set thread context of 1308 1504 cclkwivx.exe 29 PID 1308 set thread context of 1704 1308 cclkwivx.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1692 wrote to memory of 1172 1692 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 27 PID 1172 wrote to memory of 1504 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 28 PID 1172 wrote to memory of 1504 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 28 PID 1172 wrote to memory of 1504 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 28 PID 1172 wrote to memory of 1504 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 28 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1504 wrote to memory of 1308 1504 cclkwivx.exe 29 PID 1308 wrote to memory of 1704 1308 cclkwivx.exe 30 PID 1308 wrote to memory of 1704 1308 cclkwivx.exe 30 PID 1308 wrote to memory of 1704 1308 cclkwivx.exe 30 PID 1308 wrote to memory of 1704 1308 cclkwivx.exe 30 PID 1308 wrote to memory of 1704 1308 cclkwivx.exe 30 PID 1308 wrote to memory of 1704 1308 cclkwivx.exe 30 PID 1172 wrote to memory of 396 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 31 PID 1172 wrote to memory of 396 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 31 PID 1172 wrote to memory of 396 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 31 PID 1172 wrote to memory of 396 1172 48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"C:\Users\Admin\AppData\Local\Temp\48c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\cclkwivx.exe"C:\Users\Admin\cclkwivx.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\cclkwivx.exe"C:\Users\Admin\cclkwivx.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:1704
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5343.bat" "3⤵
- Deletes itself
PID:396
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD5bb034c8d8aa382466cf0e6587b229702
SHA1d67b347b02eca51be13e0a6e09eedf4702f1933c
SHA256eb42f40d7110c83317e5dcdaaa3694fd18619bbda0e0db28f03bb06240b5403b
SHA512a8637d88052fdc154cc0b2be2486f6ac9de1f2a116d2dfe4604475f06f8f77dc9d1ac4b7539100b505b58115ea8da98a561f5fcacd72096f510d208425106283
-
Filesize
78KB
MD5bc1883b07b47423bd30645e54db4775c
SHA12b96b8027083c5c44189ac03bafcc71df82a8ee1
SHA25648c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
SHA5126185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e
-
Filesize
78KB
MD5bc1883b07b47423bd30645e54db4775c
SHA12b96b8027083c5c44189ac03bafcc71df82a8ee1
SHA25648c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
SHA5126185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e
-
Filesize
78KB
MD5bc1883b07b47423bd30645e54db4775c
SHA12b96b8027083c5c44189ac03bafcc71df82a8ee1
SHA25648c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
SHA5126185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e
-
Filesize
78KB
MD5bc1883b07b47423bd30645e54db4775c
SHA12b96b8027083c5c44189ac03bafcc71df82a8ee1
SHA25648c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
SHA5126185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e
-
Filesize
78KB
MD5bc1883b07b47423bd30645e54db4775c
SHA12b96b8027083c5c44189ac03bafcc71df82a8ee1
SHA25648c2b90f3474f4d286de08c54b114428b3d73497c0878b9a6185be07489d45d8
SHA5126185931b4a06cd38dfaaecd4a60160bf7b07fa9bec3a1a2da0a1bbcda5ad7cf7f78b1a55810e065a1c6f29c7b5bbd64d584172e3d7386f6195ba1c8b4b28a85e