Analysis
-
max time kernel
152s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2022, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe
Resource
win10v2004-20220812-en
General
-
Target
41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe
-
Size
672KB
-
MD5
ded11a6887d7eeb16cc74d9ab83453cf
-
SHA1
cbcc234f18c68caa933391c6a7e1822dd1c42cc2
-
SHA256
41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff
-
SHA512
38198c83c7debb3c93556bb5cc6533a10c4511a229a5e856c7c9037fc9fc8c094269a860890a238da41e0c805375fd3673755c303c4deb8360896541e4027949
-
SSDEEP
12288:JUqxYdLKXgzNMK+IHk5OA5a5vYm0l3kxua1V09WLk8VJAgyzMaL0+hef9fC:JUqxqGc5+hOAuvB0l0c0K9WLKgyvL0+X
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4136 dest_installer_adobe_flash_player_English.exe 428 cgcabfcfbfj.exe -
Loads dropped DLL 2 IoCs
pid Process 4136 dest_installer_adobe_flash_player_English.exe 4136 dest_installer_adobe_flash_player_English.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4152 428 WerFault.exe 82 -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0006000000022e37-133.dat nsis_installer_1 behavioral2/files/0x0006000000022e37-133.dat nsis_installer_2 behavioral2/files/0x0006000000022e37-134.dat nsis_installer_1 behavioral2/files/0x0006000000022e37-134.dat nsis_installer_2 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 5116 wmic.exe Token: SeSecurityPrivilege 5116 wmic.exe Token: SeTakeOwnershipPrivilege 5116 wmic.exe Token: SeLoadDriverPrivilege 5116 wmic.exe Token: SeSystemProfilePrivilege 5116 wmic.exe Token: SeSystemtimePrivilege 5116 wmic.exe Token: SeProfSingleProcessPrivilege 5116 wmic.exe Token: SeIncBasePriorityPrivilege 5116 wmic.exe Token: SeCreatePagefilePrivilege 5116 wmic.exe Token: SeBackupPrivilege 5116 wmic.exe Token: SeRestorePrivilege 5116 wmic.exe Token: SeShutdownPrivilege 5116 wmic.exe Token: SeDebugPrivilege 5116 wmic.exe Token: SeSystemEnvironmentPrivilege 5116 wmic.exe Token: SeRemoteShutdownPrivilege 5116 wmic.exe Token: SeUndockPrivilege 5116 wmic.exe Token: SeManageVolumePrivilege 5116 wmic.exe Token: 33 5116 wmic.exe Token: 34 5116 wmic.exe Token: 35 5116 wmic.exe Token: 36 5116 wmic.exe Token: SeIncreaseQuotaPrivilege 5116 wmic.exe Token: SeSecurityPrivilege 5116 wmic.exe Token: SeTakeOwnershipPrivilege 5116 wmic.exe Token: SeLoadDriverPrivilege 5116 wmic.exe Token: SeSystemProfilePrivilege 5116 wmic.exe Token: SeSystemtimePrivilege 5116 wmic.exe Token: SeProfSingleProcessPrivilege 5116 wmic.exe Token: SeIncBasePriorityPrivilege 5116 wmic.exe Token: SeCreatePagefilePrivilege 5116 wmic.exe Token: SeBackupPrivilege 5116 wmic.exe Token: SeRestorePrivilege 5116 wmic.exe Token: SeShutdownPrivilege 5116 wmic.exe Token: SeDebugPrivilege 5116 wmic.exe Token: SeSystemEnvironmentPrivilege 5116 wmic.exe Token: SeRemoteShutdownPrivilege 5116 wmic.exe Token: SeUndockPrivilege 5116 wmic.exe Token: SeManageVolumePrivilege 5116 wmic.exe Token: 33 5116 wmic.exe Token: 34 5116 wmic.exe Token: 35 5116 wmic.exe Token: 36 5116 wmic.exe Token: SeIncreaseQuotaPrivilege 3152 wmic.exe Token: SeSecurityPrivilege 3152 wmic.exe Token: SeTakeOwnershipPrivilege 3152 wmic.exe Token: SeLoadDriverPrivilege 3152 wmic.exe Token: SeSystemProfilePrivilege 3152 wmic.exe Token: SeSystemtimePrivilege 3152 wmic.exe Token: SeProfSingleProcessPrivilege 3152 wmic.exe Token: SeIncBasePriorityPrivilege 3152 wmic.exe Token: SeCreatePagefilePrivilege 3152 wmic.exe Token: SeBackupPrivilege 3152 wmic.exe Token: SeRestorePrivilege 3152 wmic.exe Token: SeShutdownPrivilege 3152 wmic.exe Token: SeDebugPrivilege 3152 wmic.exe Token: SeSystemEnvironmentPrivilege 3152 wmic.exe Token: SeRemoteShutdownPrivilege 3152 wmic.exe Token: SeUndockPrivilege 3152 wmic.exe Token: SeManageVolumePrivilege 3152 wmic.exe Token: 33 3152 wmic.exe Token: 34 3152 wmic.exe Token: 35 3152 wmic.exe Token: 36 3152 wmic.exe Token: SeIncreaseQuotaPrivilege 3152 wmic.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4136 5084 41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe 80 PID 5084 wrote to memory of 4136 5084 41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe 80 PID 5084 wrote to memory of 4136 5084 41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe 80 PID 4136 wrote to memory of 428 4136 dest_installer_adobe_flash_player_English.exe 82 PID 4136 wrote to memory of 428 4136 dest_installer_adobe_flash_player_English.exe 82 PID 4136 wrote to memory of 428 4136 dest_installer_adobe_flash_player_English.exe 82 PID 428 wrote to memory of 5116 428 cgcabfcfbfj.exe 84 PID 428 wrote to memory of 5116 428 cgcabfcfbfj.exe 84 PID 428 wrote to memory of 5116 428 cgcabfcfbfj.exe 84 PID 428 wrote to memory of 3152 428 cgcabfcfbfj.exe 86 PID 428 wrote to memory of 3152 428 cgcabfcfbfj.exe 86 PID 428 wrote to memory of 3152 428 cgcabfcfbfj.exe 86 PID 428 wrote to memory of 4408 428 cgcabfcfbfj.exe 88 PID 428 wrote to memory of 4408 428 cgcabfcfbfj.exe 88 PID 428 wrote to memory of 4408 428 cgcabfcfbfj.exe 88 PID 428 wrote to memory of 3376 428 cgcabfcfbfj.exe 90 PID 428 wrote to memory of 3376 428 cgcabfcfbfj.exe 90 PID 428 wrote to memory of 3376 428 cgcabfcfbfj.exe 90 PID 428 wrote to memory of 4252 428 cgcabfcfbfj.exe 92 PID 428 wrote to memory of 4252 428 cgcabfcfbfj.exe 92 PID 428 wrote to memory of 4252 428 cgcabfcfbfj.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe"C:\Users\Admin\AppData\Local\Temp\41e66affd5262f7fdfa294ad9426935d7c12ff6877ed70353b6b348b738aa1ff.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\dest_installer_adobe_flash_player_English.exeC:\Users\Admin\AppData\Local\Temp\dest_installer_adobe_flash_player_English.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\cgcabfcfbfj.exeC:\Users\Admin\AppData\Local\Temp\cgcabfcfbfj.exe 9-7-7-9-6-8-5-3-5-5-3 JklCOzcpMy0zLR0mTE45SkE/OisbLEU+TU5JSkZGPzguFyg9QE1MREE4LTEvKzIXKTtEQTgrHSZJS0Y+TT5RWkRBNCssKSsvGyxOQE9NPktWT0pHOmNvcWczKCZtXW1zKW9lXCZaZ2olX15vXCtgZ19mGic+SUQ+SEA9NhcpPCw6KCwdJj0rNCcpGyw/LjokKhkmPiw4KiwbLDsuNiQrGCpNTUpBTDxNVkpKRFM8PlY0GShHTEc/Uj5PXDxORTg3GCpNTUpBTDxNVkg5SEI4PGFmW14cLChBaVxuZRwrKUdmWXRibRssPFE+Vk9KRzpjb3FnMygmal4pYWdec2BtJ1ppZSpwKi0sKShiW2peKGNtYGJqaCkoKnJfYF5dNVlcMCpeW2FjLV8tWDExLy5ZYTRfLS8oXC1bWyVqcm8oMitdLVozKjE1X18zLzInLisrMTEyLDAkX2JpX15qdShkYWdfKCksMC81MygzLi8xKTMlXGFqXWIkX2VYbWAobWdcdlxrJ1xyXRssQFNCVjxGO0ZBSUI4Gyw/SExLWTpNTFJOQkk2KhcpTEM+SUZWRk5YTExEOGVvb20xKChrYllpaG4pY2leXmppXm9wb2pvXCsnWmllKmZpX2JvJ2lfajdfajhhb1xeZmdsMSljbWBiamhfa21sam9gKWBmZh9nZW84Q01AQkpIP0tNTEpPQD5MRB9pXjc5X2xdYCIpKT9jW2tjIi0rTWNaclxsHmpkOE1CTT5HTD8eZGtub15jZV5pNzEbLFFIOikZKDtNKThDTUBCSkgpKCpSX2BeXTVZXDAqXlthYy1fLVgxMS8uWWE0Xy0vKFwtW1sYKk9QSVFARj5WUT1HQEpIQkBGOj4/TU1JOBssQExYSU9GT0ZIQDpra25cGidNQk9QT0VCRz5ZTU5CTVpBOFJMNCwYKkVEP0JPNioXKUFOXD93⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get serialnumber4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get version4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get version4⤵PID:4408
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get version4⤵PID:3376
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81669468660.txt bios get version4⤵PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 9564⤵
- Program crash
PID:4152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 428 -ip 4281⤵PID:3876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
808KB
MD56b04e4de551873580d768fa3c139a75e
SHA10675dbf10d4353967a6e205d2a7c0df50d20659b
SHA256b5ed65960bef48d448443dcc977000ccad3a1ae079de8611fa89f630a9fd4c20
SHA512cdcca80a76c39eb59648774cf78b73c45145e780d168815e17ccbef71847bad0d1222fe169801ae99f1b66651eba2faf3812c1802b059623da0ddb966ee4c32c
-
Filesize
808KB
MD56b04e4de551873580d768fa3c139a75e
SHA10675dbf10d4353967a6e205d2a7c0df50d20659b
SHA256b5ed65960bef48d448443dcc977000ccad3a1ae079de8611fa89f630a9fd4c20
SHA512cdcca80a76c39eb59648774cf78b73c45145e780d168815e17ccbef71847bad0d1222fe169801ae99f1b66651eba2faf3812c1802b059623da0ddb966ee4c32c
-
Filesize
576KB
MD5421c830f7a63c1acc9826264f1a22f1a
SHA1b28fd5924e94655d5ae0fce1d60cc504527102ab
SHA25648d3cee119cc58a344512112b1c06b54aebadecfb2e6bb3c3bd035167ead9a20
SHA512ad68ac76874188cd863a6002c34d962464fc9931c8e37573a5604e2bffbf85b6a736728aba182139767a7ce6dd82ce505ff75ce04d8100050100c82462651e7a
-
Filesize
576KB
MD5421c830f7a63c1acc9826264f1a22f1a
SHA1b28fd5924e94655d5ae0fce1d60cc504527102ab
SHA25648d3cee119cc58a344512112b1c06b54aebadecfb2e6bb3c3bd035167ead9a20
SHA512ad68ac76874188cd863a6002c34d962464fc9931c8e37573a5604e2bffbf85b6a736728aba182139767a7ce6dd82ce505ff75ce04d8100050100c82462651e7a
-
Filesize
125KB
MD546dc41240455f11b65e93cbdfe003eda
SHA1f9cd7e13e7531cdd891e8691d247eff88daddf43
SHA2563577e7c4fa2928e55c23297eab7408e1aee995c8695eee43bd05be25d3238ec2
SHA512e335ba55e1e9af1dc7c32c3f0b2b94420dda0693f47a95c95f69ceebf0606eb0b6b6180c0db3c90299cb5b55a03c720b7770c5670deb5cca6e0e339da757680f
-
Filesize
40KB
MD55f13dbc378792f23e598079fc1e4422b
SHA15813c05802f15930aa860b8363af2b58426c8adf
SHA2566e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d
SHA5129270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5