Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 00:54
Static task
static1
Behavioral task
behavioral1
Sample
a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe
Resource
win10v2004-20221111-en
General
-
Target
a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe
-
Size
125KB
-
MD5
90d470dd61a6c4e9d91a3930b23dee6c
-
SHA1
34f39dc0f969d27034611607beefa82e6bf4c9a3
-
SHA256
a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1
-
SHA512
7136d170e2319eabeb25f0200fe5e8c52e3dd7e48c5bde5b0e0a652531967ea8619ece0c357d41868b32020da5d6c949115f582d10323684a50b779f8e7e34f9
-
SSDEEP
1536:hM1UA9REYig92tJ943kJ96lomrAQANEtUe9sj36Eb9OuK7SdmTkpnpGmOyn/iuLK:21Um01743kJ9zwAR9a7SMAETXPxf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 cn-superscan3.exe -
resource yara_rule behavioral1/files/0x000600000000b2d2-55.dat upx behavioral1/files/0x000600000000b2d2-57.dat upx behavioral1/files/0x000600000000b2d2-59.dat upx behavioral1/files/0x000600000000b2d2-60.dat upx behavioral1/files/0x000600000000b2d2-61.dat upx behavioral1/files/0x000600000000b2d2-62.dat upx behavioral1/memory/2008-64-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1720 a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe 2008 cn-superscan3.exe 2008 cn-superscan3.exe 2008 cn-superscan3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\cn-superscan3.exe a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://123.sogou.com/?21133" a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2008 1720 a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe 27 PID 1720 wrote to memory of 2008 1720 a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe 27 PID 1720 wrote to memory of 2008 1720 a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe 27 PID 1720 wrote to memory of 2008 1720 a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe 27 PID 1720 wrote to memory of 2008 1720 a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe 27 PID 1720 wrote to memory of 2008 1720 a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe 27 PID 1720 wrote to memory of 2008 1720 a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe"C:\Users\Admin\AppData\Local\Temp\a80ec1b6e019a9d3a0644ac489c908a2419b79568d920d2f6917d2ccea2379d1.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cn-superscan3.exeC:\Windows\system32\cn-superscan3.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD54005a3695738604c4a0b99c8b59e1f62
SHA1efd158b4b67ffc9b7046ea0163927dc664d57ff0
SHA256fa26ebbb74b3337724962461c7764d20851ad9d99696cd52776c395fb78115f1
SHA5127080ebe155e70347ee813ba0b958cff9e3c331fdb580cc616fd30be695a8b0349bed70339ee744017462a658470108f19ba9d2a6249eb975d1feb3f4c270812e
-
Filesize
91KB
MD54005a3695738604c4a0b99c8b59e1f62
SHA1efd158b4b67ffc9b7046ea0163927dc664d57ff0
SHA256fa26ebbb74b3337724962461c7764d20851ad9d99696cd52776c395fb78115f1
SHA5127080ebe155e70347ee813ba0b958cff9e3c331fdb580cc616fd30be695a8b0349bed70339ee744017462a658470108f19ba9d2a6249eb975d1feb3f4c270812e
-
Filesize
91KB
MD54005a3695738604c4a0b99c8b59e1f62
SHA1efd158b4b67ffc9b7046ea0163927dc664d57ff0
SHA256fa26ebbb74b3337724962461c7764d20851ad9d99696cd52776c395fb78115f1
SHA5127080ebe155e70347ee813ba0b958cff9e3c331fdb580cc616fd30be695a8b0349bed70339ee744017462a658470108f19ba9d2a6249eb975d1feb3f4c270812e
-
Filesize
91KB
MD54005a3695738604c4a0b99c8b59e1f62
SHA1efd158b4b67ffc9b7046ea0163927dc664d57ff0
SHA256fa26ebbb74b3337724962461c7764d20851ad9d99696cd52776c395fb78115f1
SHA5127080ebe155e70347ee813ba0b958cff9e3c331fdb580cc616fd30be695a8b0349bed70339ee744017462a658470108f19ba9d2a6249eb975d1feb3f4c270812e
-
Filesize
91KB
MD54005a3695738604c4a0b99c8b59e1f62
SHA1efd158b4b67ffc9b7046ea0163927dc664d57ff0
SHA256fa26ebbb74b3337724962461c7764d20851ad9d99696cd52776c395fb78115f1
SHA5127080ebe155e70347ee813ba0b958cff9e3c331fdb580cc616fd30be695a8b0349bed70339ee744017462a658470108f19ba9d2a6249eb975d1feb3f4c270812e
-
Filesize
91KB
MD54005a3695738604c4a0b99c8b59e1f62
SHA1efd158b4b67ffc9b7046ea0163927dc664d57ff0
SHA256fa26ebbb74b3337724962461c7764d20851ad9d99696cd52776c395fb78115f1
SHA5127080ebe155e70347ee813ba0b958cff9e3c331fdb580cc616fd30be695a8b0349bed70339ee744017462a658470108f19ba9d2a6249eb975d1feb3f4c270812e