Analysis
-
max time kernel
266s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 16:18
Static task
static1
Behavioral task
behavioral1
Sample
951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe
Resource
win10v2004-20220901-en
General
-
Target
951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe
-
Size
972KB
-
MD5
3b7e96061f7d172c89793b2fe29f2dc8
-
SHA1
bad05521f713738d55ce6eed20dc2a1ef5a978a2
-
SHA256
951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9
-
SHA512
df807becbf861a2eb1eec58b3e6108276050d98deb0cfad80df45c1e0502b4044907c5386e4b1c9eea5eb6ae9c37d761366f134f57a3f3400e9106de4c8a044b
-
SSDEEP
12288:Bi41crnV0OIhpyYaQYiXWdNhdlk6GT+yLuAAD/DHcwb81ljj9Qv9kvCTl12Pm:Bi4Q01yYsiGdXdS6wkfDQwbuSS6+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FolderName\\file.exe" 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe -
Executes dropped EXE 1 IoCs
pid Process 1964 notepad .exe -
Loads dropped DLL 1 IoCs
pid Process 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\system32 = "C:\\Users\\Admin\\AppData\\Local\\Windows/system32\\system32.exe" notepad .exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1192 set thread context of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 620 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1964 notepad .exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe Token: 33 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe Token: SeIncBasePriorityPrivilege 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe Token: SeDebugPrivilege 1964 notepad .exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1784 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 notepad .exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1672 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 28 PID 1192 wrote to memory of 1672 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 28 PID 1192 wrote to memory of 1672 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 28 PID 1192 wrote to memory of 1672 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 28 PID 1672 wrote to memory of 1012 1672 cmd.exe 30 PID 1672 wrote to memory of 1012 1672 cmd.exe 30 PID 1672 wrote to memory of 1012 1672 cmd.exe 30 PID 1672 wrote to memory of 1012 1672 cmd.exe 30 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1192 wrote to memory of 1964 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 31 PID 1012 wrote to memory of 684 1012 wscript.exe 32 PID 1012 wrote to memory of 684 1012 wscript.exe 32 PID 1012 wrote to memory of 684 1012 wscript.exe 32 PID 1012 wrote to memory of 684 1012 wscript.exe 32 PID 1192 wrote to memory of 336 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 34 PID 1192 wrote to memory of 336 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 34 PID 1192 wrote to memory of 336 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 34 PID 1192 wrote to memory of 336 1192 951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe 34 PID 336 wrote to memory of 620 336 cmd.exe 36 PID 336 wrote to memory of 620 336 cmd.exe 36 PID 336 wrote to memory of 620 336 cmd.exe 36 PID 336 wrote to memory of 620 336 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe"C:\Users\Admin\AppData\Local\Temp\951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FolderName\mata.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\FolderName\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\FolderName\mata2.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FolderName\mata2.bat" "4⤵PID:684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\notepad .exe"C:\Users\Admin\AppData\Local\Temp\notepad .exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FolderName\notepad.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- Delays execution with timeout.exe
PID:620
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1784
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD58b297ab3c2517e90e3a33b588d184190
SHA16c9d2fbcac252a93f981f2d617ba1fa910c336ce
SHA2563f17787e46488ed2eca20b5014e4c51ed073086e5be13e7597bdaf0a90e13189
SHA5128cc2c0aa8fd92296fca41188402518296dbec68dc57968ef5e63336a745138d75752e42b63531bac95163886f932d94ee33ba0a5ada162540797398cf7530591
-
Filesize
972KB
MD53b7e96061f7d172c89793b2fe29f2dc8
SHA1bad05521f713738d55ce6eed20dc2a1ef5a978a2
SHA256951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9
SHA512df807becbf861a2eb1eec58b3e6108276050d98deb0cfad80df45c1e0502b4044907c5386e4b1c9eea5eb6ae9c37d761366f134f57a3f3400e9106de4c8a044b
-
Filesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
Filesize
69B
MD5c96a3b31fc4a115c977ce5d8a3256f4f
SHA18c71b0d75099af30ac1fe33266e3970b47ba716d
SHA256a5b672a4863abcf46556d2e606b2833e8897a3206e554ad93043a82a792df49e
SHA512f4337e85ca0b3c0242c35a09f1ff7154c9e37ea3c7de3c2337385fb4b57e25a8550877ce2f37d023c94a3fa69b2b4e003207790297879d29a5bbe4856d0a0f48
-
Filesize
71B
MD5068b098f8c807465a86da0256d8e22c7
SHA171f4205e5c884f829fc3f500cc4adf3828404a58
SHA2561724823b6967f9d2931c3b55f09ee095a69ad8e13ae7b338ee22a5c56eeaf05d
SHA512e9432cdebd7dff6f96aad870ea8e9713f618cadcfa720c0a10cd4d62b3f8d129d5efb1e170e6712afc23157d45f5e8c8f3bce80310a27d1e994e6e1af5314626
-
Filesize
211B
MD5fcea7e008224fa9f82bba83e3562baf0
SHA1f8ccd10830a0e5e979099a022fb07019e2ac479e
SHA2560d9caf1dc4c3317085c4fd81a56df506c99dacb883c341a2250d8ef9beffbdba
SHA5125083a7b3500841b05c879151cde2dda997cf70fbe0dbec5b218dc5efe37084af976fcb67511c92fff21f6b0b5dafdc01f03b448b731db56e7f1f851017467304
-
Filesize
972KB
MD53b7e96061f7d172c89793b2fe29f2dc8
SHA1bad05521f713738d55ce6eed20dc2a1ef5a978a2
SHA256951ca02475136fd340c7232763b85a734ffd668dc0134fe2c60d5658213387a9
SHA512df807becbf861a2eb1eec58b3e6108276050d98deb0cfad80df45c1e0502b4044907c5386e4b1c9eea5eb6ae9c37d761366f134f57a3f3400e9106de4c8a044b
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9
-
Filesize
52KB
MD5278edbd499374bf73621f8c1f969d894
SHA1a81170af14747781c5f5f51bb1215893136f0bc0
SHA256c6999b9f79932c3b4f1c461a69d9dc8dc301d6a155abc33efe1b6e9e4a038391
SHA51293b0b5c3324bd2df83310f96d34c9176c94d2d676766599c1af33c98ba1efe63187056671f7c6f80c956e5bd0a725f108804021ad93326286bb9c3a96f6550b9