Analysis
-
max time kernel
173s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 17:44
Static task
static1
Behavioral task
behavioral1
Sample
48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe
Resource
win10v2004-20220901-en
General
-
Target
48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe
-
Size
500KB
-
MD5
843432b5ea32455ac18c36d13372c816
-
SHA1
b1c6e470ad90dd9f4aaf6672bc3b1e0984e5dc45
-
SHA256
48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0
-
SHA512
0d332b6cc0fb333552dc0f43ba4a20ed35dfc289059b8879b1d61c4d911e0baa903bc407c3ee7e5224270976abccc204a7fe181e86aa18f961087f603bdf210f
-
SSDEEP
12288:VwnUqVgJHLiZsqrDUyuETnEbv5wn7uoQ3iA:VwUIywsAuEgbv5Iu6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 704 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe -
Deletes itself 1 IoCs
pid Process 1700 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\IMEPADSV = "C:\\Users\\Admin\\AppData\\Local\\Microsoft IME\\IMEPADSV.exe" 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\IMEPADSV = "\\Microsoft IME\\IMEPADSV.exe" 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1624 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 704 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe Token: 33 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe Token: SeIncBasePriorityPrivilege 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe Token: SeDebugPrivilege 704 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe Token: 33 704 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe Token: SeIncBasePriorityPrivilege 704 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 704 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1248 wrote to memory of 704 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 28 PID 1248 wrote to memory of 704 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 28 PID 1248 wrote to memory of 704 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 28 PID 1248 wrote to memory of 704 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 28 PID 1248 wrote to memory of 1700 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 29 PID 1248 wrote to memory of 1700 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 29 PID 1248 wrote to memory of 1700 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 29 PID 1248 wrote to memory of 1700 1248 48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe 29 PID 1700 wrote to memory of 1624 1700 cmd.exe 31 PID 1700 wrote to memory of 1624 1700 cmd.exe 31 PID 1700 wrote to memory of 1624 1700 cmd.exe 31 PID 1700 wrote to memory of 1624 1700 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe"C:\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe"C:\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:704
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1624
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe
Filesize500KB
MD5843432b5ea32455ac18c36d13372c816
SHA1b1c6e470ad90dd9f4aaf6672bc3b1e0984e5dc45
SHA25648f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0
SHA5120d332b6cc0fb333552dc0f43ba4a20ed35dfc289059b8879b1d61c4d911e0baa903bc407c3ee7e5224270976abccc204a7fe181e86aa18f961087f603bdf210f
-
C:\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe
Filesize500KB
MD5843432b5ea32455ac18c36d13372c816
SHA1b1c6e470ad90dd9f4aaf6672bc3b1e0984e5dc45
SHA25648f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0
SHA5120d332b6cc0fb333552dc0f43ba4a20ed35dfc289059b8879b1d61c4d911e0baa903bc407c3ee7e5224270976abccc204a7fe181e86aa18f961087f603bdf210f
-
\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe
Filesize500KB
MD5843432b5ea32455ac18c36d13372c816
SHA1b1c6e470ad90dd9f4aaf6672bc3b1e0984e5dc45
SHA25648f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0
SHA5120d332b6cc0fb333552dc0f43ba4a20ed35dfc289059b8879b1d61c4d911e0baa903bc407c3ee7e5224270976abccc204a7fe181e86aa18f961087f603bdf210f
-
\Users\Admin\AppData\Local\Temp\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0\48f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0.exe
Filesize500KB
MD5843432b5ea32455ac18c36d13372c816
SHA1b1c6e470ad90dd9f4aaf6672bc3b1e0984e5dc45
SHA25648f86d86d6280af3e5c08bc961b175b919d3fdd054bc8f1b2faa95106d7d82c0
SHA5120d332b6cc0fb333552dc0f43ba4a20ed35dfc289059b8879b1d61c4d911e0baa903bc407c3ee7e5224270976abccc204a7fe181e86aa18f961087f603bdf210f