Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 21:54
Static task
static1
Behavioral task
behavioral1
Sample
8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe
Resource
win10v2004-20221111-en
General
-
Target
8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe
-
Size
541KB
-
MD5
31b25ecd777f5cfc1602d97cd0c75d75
-
SHA1
e520b1bdb3841fe57ae070c13423ac87b2c2ecfd
-
SHA256
8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e
-
SHA512
1ba67db34873c729551cfb34228f18b4613a28b90f64dddf81541f54cb40359e92ac0c1a1807dc5c1b36072c0bc6f96f59349c5eee496bde887486f0ea30f919
-
SSDEEP
12288:lDKm7St/yUo7LWRX4U7iJmVd3DblL5y7ufSdAG2HvypW:MmU/yUo7LWRXPBrDblL5R6dA/5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1920 Firefox Setup Stub 34.0.5.exe 1264 ProtectDLL.exe 1276 setup-stub.exe -
resource yara_rule behavioral1/files/0x00150000000054ab-55.dat upx behavioral1/files/0x00150000000054ab-57.dat upx behavioral1/files/0x00150000000054ab-61.dat upx behavioral1/files/0x00150000000054ab-60.dat upx behavioral1/files/0x00150000000054ab-59.dat upx behavioral1/memory/1920-76-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Loads dropped DLL 15 IoCs
pid Process 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 1920 Firefox Setup Stub 34.0.5.exe 1920 Firefox Setup Stub 34.0.5.exe 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 1920 Firefox Setup Stub 34.0.5.exe 1276 setup-stub.exe 1276 setup-stub.exe 1276 setup-stub.exe 1276 setup-stub.exe 1276 setup-stub.exe 728 WerFault.exe 728 WerFault.exe 728 WerFault.exe 728 WerFault.exe 728 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 728 1264 WerFault.exe 29 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 1264 ProtectDLL.exe Token: SeSecurityPrivilege 1264 ProtectDLL.exe Token: SeSecurityPrivilege 1264 ProtectDLL.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1920 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 28 PID 1896 wrote to memory of 1920 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 28 PID 1896 wrote to memory of 1920 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 28 PID 1896 wrote to memory of 1920 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 28 PID 1896 wrote to memory of 1920 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 28 PID 1896 wrote to memory of 1920 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 28 PID 1896 wrote to memory of 1920 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 28 PID 1896 wrote to memory of 1264 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 29 PID 1896 wrote to memory of 1264 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 29 PID 1896 wrote to memory of 1264 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 29 PID 1896 wrote to memory of 1264 1896 8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe 29 PID 1920 wrote to memory of 1276 1920 Firefox Setup Stub 34.0.5.exe 30 PID 1920 wrote to memory of 1276 1920 Firefox Setup Stub 34.0.5.exe 30 PID 1920 wrote to memory of 1276 1920 Firefox Setup Stub 34.0.5.exe 30 PID 1920 wrote to memory of 1276 1920 Firefox Setup Stub 34.0.5.exe 30 PID 1920 wrote to memory of 1276 1920 Firefox Setup Stub 34.0.5.exe 30 PID 1920 wrote to memory of 1276 1920 Firefox Setup Stub 34.0.5.exe 30 PID 1920 wrote to memory of 1276 1920 Firefox Setup Stub 34.0.5.exe 30 PID 1264 wrote to memory of 728 1264 ProtectDLL.exe 31 PID 1264 wrote to memory of 728 1264 ProtectDLL.exe 31 PID 1264 wrote to memory of 728 1264 ProtectDLL.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe"C:\Users\Admin\AppData\Local\Temp\8854eb9bb6d67e46c6ac0357047274b6f7338ceb602cfc3d991d0bd6b560862e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\Firefox Setup Stub 34.0.5.exe"C:\Users\Admin\AppData\Local\Temp\Firefox Setup Stub 34.0.5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\7zSF632.tmp\setup-stub.exe.\setup-stub.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\ProtectDLL.exe"C:\Users\Admin\AppData\Local\Temp\ProtectDLL.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1264 -s 6003⤵
- Loads dropped DLL
- Program crash
PID:728
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1014KB
MD512925c7139d00db67b41f9f7716e5038
SHA1c138304dfa1af7c289e44cc2199ef34c3e14fa12
SHA2566577ebe5b6f77b2100c102a9fdb626b70c56a884b6d058dcebacb4d319dd951a
SHA512ef440a33dcf8709f4c13c4c7393ca1d061fb16a5d6bacfc6c3ee77c2186686ac5b756e67d5a99c82d9f9f3e3a1215424778843397d541a90b1b25bdc7a33ed0b
-
Filesize
1014KB
MD512925c7139d00db67b41f9f7716e5038
SHA1c138304dfa1af7c289e44cc2199ef34c3e14fa12
SHA2566577ebe5b6f77b2100c102a9fdb626b70c56a884b6d058dcebacb4d319dd951a
SHA512ef440a33dcf8709f4c13c4c7393ca1d061fb16a5d6bacfc6c3ee77c2186686ac5b756e67d5a99c82d9f9f3e3a1215424778843397d541a90b1b25bdc7a33ed0b
-
Filesize
238KB
MD57d109ecd57186a8a056d44a200d4c98b
SHA1e15bbd7800dea60bacc1b7c86759dad5b85e74f9
SHA2561d95c36a600ad2fe7296071e8eae859477c8f960db46e6b7e46f2be722ed1a13
SHA512f0cf0575b3ab3754dbe307f4214278f840e540e9d48196ddf9f246ff4d3043f3552849bb1adfaac560afaa62e2df67d2c2148801181e51a814b2d50fb178405d
-
Filesize
238KB
MD57d109ecd57186a8a056d44a200d4c98b
SHA1e15bbd7800dea60bacc1b7c86759dad5b85e74f9
SHA2561d95c36a600ad2fe7296071e8eae859477c8f960db46e6b7e46f2be722ed1a13
SHA512f0cf0575b3ab3754dbe307f4214278f840e540e9d48196ddf9f246ff4d3043f3552849bb1adfaac560afaa62e2df67d2c2148801181e51a814b2d50fb178405d
-
Filesize
385KB
MD5d9e50d24eb89c82dcce3fcc0a4781ba3
SHA1fd7697cfd05b4c7d467da6bd7aa86cdef0762b76
SHA256e5e6adc57e1025c05bcf6622083feece3f988b4b03038def731a3abcaf025667
SHA5125e1715c702b700f90b980c102290b8c324ae44132d9b67a33d7ef78d89915ebb1ed208da876b2987112f2e8e91cab3eb7763e04e87ac808cba8ab95f0c74bf4c
-
Filesize
385KB
MD5d9e50d24eb89c82dcce3fcc0a4781ba3
SHA1fd7697cfd05b4c7d467da6bd7aa86cdef0762b76
SHA256e5e6adc57e1025c05bcf6622083feece3f988b4b03038def731a3abcaf025667
SHA5125e1715c702b700f90b980c102290b8c324ae44132d9b67a33d7ef78d89915ebb1ed208da876b2987112f2e8e91cab3eb7763e04e87ac808cba8ab95f0c74bf4c
-
Filesize
1014KB
MD512925c7139d00db67b41f9f7716e5038
SHA1c138304dfa1af7c289e44cc2199ef34c3e14fa12
SHA2566577ebe5b6f77b2100c102a9fdb626b70c56a884b6d058dcebacb4d319dd951a
SHA512ef440a33dcf8709f4c13c4c7393ca1d061fb16a5d6bacfc6c3ee77c2186686ac5b756e67d5a99c82d9f9f3e3a1215424778843397d541a90b1b25bdc7a33ed0b
-
Filesize
1014KB
MD512925c7139d00db67b41f9f7716e5038
SHA1c138304dfa1af7c289e44cc2199ef34c3e14fa12
SHA2566577ebe5b6f77b2100c102a9fdb626b70c56a884b6d058dcebacb4d319dd951a
SHA512ef440a33dcf8709f4c13c4c7393ca1d061fb16a5d6bacfc6c3ee77c2186686ac5b756e67d5a99c82d9f9f3e3a1215424778843397d541a90b1b25bdc7a33ed0b
-
Filesize
1014KB
MD512925c7139d00db67b41f9f7716e5038
SHA1c138304dfa1af7c289e44cc2199ef34c3e14fa12
SHA2566577ebe5b6f77b2100c102a9fdb626b70c56a884b6d058dcebacb4d319dd951a
SHA512ef440a33dcf8709f4c13c4c7393ca1d061fb16a5d6bacfc6c3ee77c2186686ac5b756e67d5a99c82d9f9f3e3a1215424778843397d541a90b1b25bdc7a33ed0b
-
Filesize
238KB
MD57d109ecd57186a8a056d44a200d4c98b
SHA1e15bbd7800dea60bacc1b7c86759dad5b85e74f9
SHA2561d95c36a600ad2fe7296071e8eae859477c8f960db46e6b7e46f2be722ed1a13
SHA512f0cf0575b3ab3754dbe307f4214278f840e540e9d48196ddf9f246ff4d3043f3552849bb1adfaac560afaa62e2df67d2c2148801181e51a814b2d50fb178405d
-
Filesize
238KB
MD57d109ecd57186a8a056d44a200d4c98b
SHA1e15bbd7800dea60bacc1b7c86759dad5b85e74f9
SHA2561d95c36a600ad2fe7296071e8eae859477c8f960db46e6b7e46f2be722ed1a13
SHA512f0cf0575b3ab3754dbe307f4214278f840e540e9d48196ddf9f246ff4d3043f3552849bb1adfaac560afaa62e2df67d2c2148801181e51a814b2d50fb178405d
-
Filesize
238KB
MD57d109ecd57186a8a056d44a200d4c98b
SHA1e15bbd7800dea60bacc1b7c86759dad5b85e74f9
SHA2561d95c36a600ad2fe7296071e8eae859477c8f960db46e6b7e46f2be722ed1a13
SHA512f0cf0575b3ab3754dbe307f4214278f840e540e9d48196ddf9f246ff4d3043f3552849bb1adfaac560afaa62e2df67d2c2148801181e51a814b2d50fb178405d
-
Filesize
385KB
MD5d9e50d24eb89c82dcce3fcc0a4781ba3
SHA1fd7697cfd05b4c7d467da6bd7aa86cdef0762b76
SHA256e5e6adc57e1025c05bcf6622083feece3f988b4b03038def731a3abcaf025667
SHA5125e1715c702b700f90b980c102290b8c324ae44132d9b67a33d7ef78d89915ebb1ed208da876b2987112f2e8e91cab3eb7763e04e87ac808cba8ab95f0c74bf4c
-
Filesize
385KB
MD5d9e50d24eb89c82dcce3fcc0a4781ba3
SHA1fd7697cfd05b4c7d467da6bd7aa86cdef0762b76
SHA256e5e6adc57e1025c05bcf6622083feece3f988b4b03038def731a3abcaf025667
SHA5125e1715c702b700f90b980c102290b8c324ae44132d9b67a33d7ef78d89915ebb1ed208da876b2987112f2e8e91cab3eb7763e04e87ac808cba8ab95f0c74bf4c
-
Filesize
385KB
MD5d9e50d24eb89c82dcce3fcc0a4781ba3
SHA1fd7697cfd05b4c7d467da6bd7aa86cdef0762b76
SHA256e5e6adc57e1025c05bcf6622083feece3f988b4b03038def731a3abcaf025667
SHA5125e1715c702b700f90b980c102290b8c324ae44132d9b67a33d7ef78d89915ebb1ed208da876b2987112f2e8e91cab3eb7763e04e87ac808cba8ab95f0c74bf4c
-
Filesize
385KB
MD5d9e50d24eb89c82dcce3fcc0a4781ba3
SHA1fd7697cfd05b4c7d467da6bd7aa86cdef0762b76
SHA256e5e6adc57e1025c05bcf6622083feece3f988b4b03038def731a3abcaf025667
SHA5125e1715c702b700f90b980c102290b8c324ae44132d9b67a33d7ef78d89915ebb1ed208da876b2987112f2e8e91cab3eb7763e04e87ac808cba8ab95f0c74bf4c
-
Filesize
385KB
MD5d9e50d24eb89c82dcce3fcc0a4781ba3
SHA1fd7697cfd05b4c7d467da6bd7aa86cdef0762b76
SHA256e5e6adc57e1025c05bcf6622083feece3f988b4b03038def731a3abcaf025667
SHA5125e1715c702b700f90b980c102290b8c324ae44132d9b67a33d7ef78d89915ebb1ed208da876b2987112f2e8e91cab3eb7763e04e87ac808cba8ab95f0c74bf4c
-
Filesize
385KB
MD5d9e50d24eb89c82dcce3fcc0a4781ba3
SHA1fd7697cfd05b4c7d467da6bd7aa86cdef0762b76
SHA256e5e6adc57e1025c05bcf6622083feece3f988b4b03038def731a3abcaf025667
SHA5125e1715c702b700f90b980c102290b8c324ae44132d9b67a33d7ef78d89915ebb1ed208da876b2987112f2e8e91cab3eb7763e04e87ac808cba8ab95f0c74bf4c
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
18KB
MD5113c5f02686d865bc9e8332350274fd1
SHA14fa4414666f8091e327adb4d81a98a0d6e2e254a
SHA2560d21041a1b5cd9f9968fc1d457c78a802c9c5a23f375327e833501b65bcd095d
SHA512e190d1ee50c0b2446b14f0d9994a0ce58f5dbd2aa5d579f11b3a342da1d4abf0f833a0415d3817636b237930f314be54e4c85b4db4a9b4a3e532980ea9c91284
-
Filesize
9KB
MD5f7b92b78f1a00a872c8a38f40afa7d65
SHA1872522498f69ad49270190c74cf3af28862057f2
SHA2562bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e
SHA5123ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79