Analysis
-
max time kernel
192s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe
Resource
win10v2004-20221111-en
General
-
Target
12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe
-
Size
178KB
-
MD5
d4df43daed64639edb9d1eeb230b0830
-
SHA1
d1448cffd82acbb397d29464fec70e2a8dae506a
-
SHA256
12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b
-
SHA512
d5d3dbb75da6566925a4c3bd141e86b252c729aec1ba99f03670978adfbeb170eef0cb0f8570573196aaf878a58114dc4702dbd6ec26a5b8e402b2810d91253e
-
SSDEEP
3072:8VNyggjH8ElZlT5rud6tPWynmNC2mWhZJkbpD7ChfEjCDn8GIs+iUodbK:8VNyggjH8Ez15rFWyn72mwoWhfEjCb8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1168 Chrome.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 988 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bdf9b570581551d135059f143c5de3a8.exe Chrome.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bdf9b570581551d135059f143c5de3a8.exe Chrome.exe -
Loads dropped DLL 1 IoCs
pid Process 1384 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\bdf9b570581551d135059f143c5de3a8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Chrome.exe\" .." Chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bdf9b570581551d135059f143c5de3a8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Chrome.exe\" .." Chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 1168 Chrome.exe Token: 33 1168 Chrome.exe Token: SeIncBasePriorityPrivilege 1168 Chrome.exe Token: 33 1168 Chrome.exe Token: SeIncBasePriorityPrivilege 1168 Chrome.exe Token: 33 1168 Chrome.exe Token: SeIncBasePriorityPrivilege 1168 Chrome.exe Token: 33 1168 Chrome.exe Token: SeIncBasePriorityPrivilege 1168 Chrome.exe Token: 33 1168 Chrome.exe Token: SeIncBasePriorityPrivilege 1168 Chrome.exe Token: 33 1168 Chrome.exe Token: SeIncBasePriorityPrivilege 1168 Chrome.exe Token: 33 1168 Chrome.exe Token: SeIncBasePriorityPrivilege 1168 Chrome.exe Token: 33 1168 Chrome.exe Token: SeIncBasePriorityPrivilege 1168 Chrome.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1168 1384 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe 28 PID 1384 wrote to memory of 1168 1384 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe 28 PID 1384 wrote to memory of 1168 1384 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe 28 PID 1384 wrote to memory of 1168 1384 12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe 28 PID 1168 wrote to memory of 988 1168 Chrome.exe 29 PID 1168 wrote to memory of 988 1168 Chrome.exe 29 PID 1168 wrote to memory of 988 1168 Chrome.exe 29 PID 1168 wrote to memory of 988 1168 Chrome.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe"C:\Users\Admin\AppData\Local\Temp\12a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Chrome.exe"C:\Users\Admin\AppData\Local\Temp\Chrome.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Chrome.exe" "Chrome.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5d4df43daed64639edb9d1eeb230b0830
SHA1d1448cffd82acbb397d29464fec70e2a8dae506a
SHA25612a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b
SHA512d5d3dbb75da6566925a4c3bd141e86b252c729aec1ba99f03670978adfbeb170eef0cb0f8570573196aaf878a58114dc4702dbd6ec26a5b8e402b2810d91253e
-
Filesize
178KB
MD5d4df43daed64639edb9d1eeb230b0830
SHA1d1448cffd82acbb397d29464fec70e2a8dae506a
SHA25612a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b
SHA512d5d3dbb75da6566925a4c3bd141e86b252c729aec1ba99f03670978adfbeb170eef0cb0f8570573196aaf878a58114dc4702dbd6ec26a5b8e402b2810d91253e
-
Filesize
178KB
MD5d4df43daed64639edb9d1eeb230b0830
SHA1d1448cffd82acbb397d29464fec70e2a8dae506a
SHA25612a018430ba7c93f8a9bf45bb4ff7c49380fb0cf64fa4621372d794c78f5a01b
SHA512d5d3dbb75da6566925a4c3bd141e86b252c729aec1ba99f03670978adfbeb170eef0cb0f8570573196aaf878a58114dc4702dbd6ec26a5b8e402b2810d91253e