Analysis
-
max time kernel
161s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 04:47
Static task
static1
Behavioral task
behavioral1
Sample
596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe
Resource
win10v2004-20220901-en
General
-
Target
596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe
-
Size
1.2MB
-
MD5
02c0b8b0987037a1a69a60ab28f448aa
-
SHA1
6cdfd4eaec28c5ab2c8f42e7daf1289aeaa461cf
-
SHA256
596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874
-
SHA512
28877adaabe32465cb567e9c31d2cc25ed06d7854761c522abba1d0ce48453c896b4a311a7f9a8f6c420dbbc986f71d64e5330e806570883f014caaf05c9dd1d
-
SSDEEP
24576:uZeZdWCFhod4oBOLA0IhJdEbYVVnmV+nOJ84wSBTsBbylk+k8ir:uZeZd7FGqoBOLATabYG+u87lWk+Qr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exedl.exepid process 944 ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe 1784 dl.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe vmprotect C:\Users\Admin\AppData\Local\Temp\¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe vmprotect C:\Users\Admin\AppData\Local\Temp\¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe vmprotect behavioral1/memory/944-66-0x0000000001110000-0x0000000001379000-memory.dmp vmprotect behavioral1/memory/944-67-0x0000000001110000-0x0000000001379000-memory.dmp vmprotect behavioral1/memory/944-74-0x0000000001110000-0x0000000001379000-memory.dmp vmprotect -
Loads dropped DLL 3 IoCs
Processes:
596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exepid process 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
dl.exe¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main dl.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exedl.exepid process 944 ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe 1784 dl.exe 944 ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe 944 ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe 944 ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe 944 ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe 1784 dl.exe 1784 dl.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exedescription pid process target process PID 900 wrote to memory of 944 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe PID 900 wrote to memory of 944 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe PID 900 wrote to memory of 944 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe PID 900 wrote to memory of 944 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe ¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe PID 900 wrote to memory of 1784 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe dl.exe PID 900 wrote to memory of 1784 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe dl.exe PID 900 wrote to memory of 1784 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe dl.exe PID 900 wrote to memory of 1784 900 596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe dl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe"C:\Users\Admin\AppData\Local\Temp\596ab1a1f7d50a65aa7f608a9305e419f4cf8115f8b50559900512ba18d9d874.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe"C:\Users\Admin\AppData\Local\Temp\¡ºìÅÎè²Êºç¡»Õýʽ·þ9.15°æ.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\dl.exe"C:\Users\Admin\AppData\Local\Temp\dl.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5aced796f88cbc02297c0b71d53ba37a7
SHA142a3782fc6d2ef30747e040f794894c75e799bb3
SHA2567dcbb23d270585bf15d5c8200867233f37cdfa146b82f1ff33d65290ffed1aaa
SHA5122b2a6aa9b274ccf51ce9d6caab9c34e60248aa3bf660b42e1a190b4f25c0b54d690e88a972b8905a826237e0826b72b59817457e2499424ab5ad2568a4a44e08
-
Filesize
32KB
MD5aced796f88cbc02297c0b71d53ba37a7
SHA142a3782fc6d2ef30747e040f794894c75e799bb3
SHA2567dcbb23d270585bf15d5c8200867233f37cdfa146b82f1ff33d65290ffed1aaa
SHA5122b2a6aa9b274ccf51ce9d6caab9c34e60248aa3bf660b42e1a190b4f25c0b54d690e88a972b8905a826237e0826b72b59817457e2499424ab5ad2568a4a44e08
-
Filesize
1.1MB
MD5cf18513664273db59cfe9c4d6f943dcb
SHA112ff7e7b70e58d527276b75270607e6336f0bfce
SHA256f596a7546de74c3268373c1c14f1fca061f84a24ccb1306d5ddbca9239ba0991
SHA512b70c137009ec5d89016c4ee30c5aef76a3c542e80bd30b1ba14690ccdd54fd6c9109ce8bbf531ee9aef0be19d66c05231c67b73f5e7cda817abc086174af6e7f
-
Filesize
1.1MB
MD5cf18513664273db59cfe9c4d6f943dcb
SHA112ff7e7b70e58d527276b75270607e6336f0bfce
SHA256f596a7546de74c3268373c1c14f1fca061f84a24ccb1306d5ddbca9239ba0991
SHA512b70c137009ec5d89016c4ee30c5aef76a3c542e80bd30b1ba14690ccdd54fd6c9109ce8bbf531ee9aef0be19d66c05231c67b73f5e7cda817abc086174af6e7f
-
Filesize
32KB
MD5aced796f88cbc02297c0b71d53ba37a7
SHA142a3782fc6d2ef30747e040f794894c75e799bb3
SHA2567dcbb23d270585bf15d5c8200867233f37cdfa146b82f1ff33d65290ffed1aaa
SHA5122b2a6aa9b274ccf51ce9d6caab9c34e60248aa3bf660b42e1a190b4f25c0b54d690e88a972b8905a826237e0826b72b59817457e2499424ab5ad2568a4a44e08
-
Filesize
32KB
MD5aced796f88cbc02297c0b71d53ba37a7
SHA142a3782fc6d2ef30747e040f794894c75e799bb3
SHA2567dcbb23d270585bf15d5c8200867233f37cdfa146b82f1ff33d65290ffed1aaa
SHA5122b2a6aa9b274ccf51ce9d6caab9c34e60248aa3bf660b42e1a190b4f25c0b54d690e88a972b8905a826237e0826b72b59817457e2499424ab5ad2568a4a44e08
-
Filesize
1.1MB
MD5cf18513664273db59cfe9c4d6f943dcb
SHA112ff7e7b70e58d527276b75270607e6336f0bfce
SHA256f596a7546de74c3268373c1c14f1fca061f84a24ccb1306d5ddbca9239ba0991
SHA512b70c137009ec5d89016c4ee30c5aef76a3c542e80bd30b1ba14690ccdd54fd6c9109ce8bbf531ee9aef0be19d66c05231c67b73f5e7cda817abc086174af6e7f