Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe
Resource
win10v2004-20220812-en
General
-
Target
2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe
-
Size
232KB
-
MD5
d7d5a8136962ee21e14fa33f127064da
-
SHA1
f97737161502842fa07add7b89be3b34271df3c3
-
SHA256
2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f
-
SHA512
da0cade98fae9ef332ebec7b51b513b73402da1e4ed5ba3b1d7078caa957d9bf66da3ca9e865e54102aed546f5948ffad8bae87c4abb19363df97f8d4eb26a2b
-
SSDEEP
3072:AMdgD6dbNFko1ayFCpEZWCfEgl+D7t5VOcoF/7UbNVLPLcqcoMaUfdqMwuW0Gc3I:Jdge1NFVH0pwpMfN5V7bzooMkMwHc0U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1416 winvrtd.exe -
Loads dropped DLL 2 IoCs
pid Process 832 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe 832 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\winvrtd.exe 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe File opened for modification C:\Windows\SysWOW64\winvtd.db 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe File created C:\Windows\SysWOW64\winvtd32.dll winvrtd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe 1416 winvrtd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 832 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe 832 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 1416 832 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe 28 PID 832 wrote to memory of 1416 832 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe 28 PID 832 wrote to memory of 1416 832 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe 28 PID 832 wrote to memory of 1416 832 2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe"C:\Users\Admin\AppData\Local\Temp\2045a435826ab52f8f80b9d1de96c6be728971cbdc2dd601864d358a6977c92f.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\winvrtd.exe"C:\Windows\system32\winvrtd.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:1416
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5b4e8d5954975ae43cbf09bf0d7992683
SHA1c530cfaf2d82d3cc1839e8dbca40148b276fad79
SHA2565bb33f70e6dd09970031cfadbce415345f0ce77ea78c030376f8d54d8d5c8142
SHA5120da4996cd7d22517f9ba265ece55f802f651b43cbfd17f878365a794d991574dc24b7361c22c8886eac135d86663296812d7fcb9ed2650f44a63339010775810
-
Filesize
128KB
MD5b4e8d5954975ae43cbf09bf0d7992683
SHA1c530cfaf2d82d3cc1839e8dbca40148b276fad79
SHA2565bb33f70e6dd09970031cfadbce415345f0ce77ea78c030376f8d54d8d5c8142
SHA5120da4996cd7d22517f9ba265ece55f802f651b43cbfd17f878365a794d991574dc24b7361c22c8886eac135d86663296812d7fcb9ed2650f44a63339010775810
-
Filesize
128KB
MD5b4e8d5954975ae43cbf09bf0d7992683
SHA1c530cfaf2d82d3cc1839e8dbca40148b276fad79
SHA2565bb33f70e6dd09970031cfadbce415345f0ce77ea78c030376f8d54d8d5c8142
SHA5120da4996cd7d22517f9ba265ece55f802f651b43cbfd17f878365a794d991574dc24b7361c22c8886eac135d86663296812d7fcb9ed2650f44a63339010775810