Analysis
-
max time kernel
266s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 01:17
Static task
static1
Behavioral task
behavioral1
Sample
fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
Resource
win10v2004-20220812-en
General
-
Target
fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
-
Size
282KB
-
MD5
5a01389f7ff9377d4989af22abb57e48
-
SHA1
6e5b77d5d7969a6640a30e0252b92b3bc4df11a5
-
SHA256
fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71
-
SHA512
4afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa
-
SSDEEP
6144:i/LFWA8yi6hcfX/uxlrWxM1WyxnlVUO7gHB89ULeuEwLTRGS:AVi2cfXmxdyMLxlX7gh8QpLToS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 1736 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe -
Loads dropped DLL 3 IoCs
pid Process 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Software Utilizer = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Utilizer.exe" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Windows Software Utilizer = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Utilizer.exe" WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Default Key = "C:\\Users\\Admin\\AppData\\Roaming\\ProgramData\\dllnh.exe" fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1044 set thread context of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1612 set thread context of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 108 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe Token: SeDebugPrivilege 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe Token: SeDebugPrivilege 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe Token: SeDebugPrivilege 1736 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe Token: SeDebugPrivilege 1736 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1736 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1576 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 28 PID 1044 wrote to memory of 1576 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 28 PID 1044 wrote to memory of 1576 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 28 PID 1044 wrote to memory of 1576 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 28 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1668 wrote to memory of 1704 1668 explorer.exe 31 PID 1668 wrote to memory of 1704 1668 explorer.exe 31 PID 1668 wrote to memory of 1704 1668 explorer.exe 31 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1044 wrote to memory of 1400 1044 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 29 PID 1400 wrote to memory of 1612 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 32 PID 1400 wrote to memory of 1612 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 32 PID 1400 wrote to memory of 1612 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 32 PID 1400 wrote to memory of 1612 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 32 PID 1400 wrote to memory of 860 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 33 PID 1400 wrote to memory of 860 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 33 PID 1400 wrote to memory of 860 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 33 PID 1400 wrote to memory of 860 1400 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 33 PID 860 wrote to memory of 108 860 cmd.exe 35 PID 860 wrote to memory of 108 860 cmd.exe 35 PID 860 wrote to memory of 108 860 cmd.exe 35 PID 860 wrote to memory of 108 860 cmd.exe 35 PID 1612 wrote to memory of 2032 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 36 PID 1612 wrote to memory of 2032 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 36 PID 1612 wrote to memory of 2032 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 36 PID 1612 wrote to memory of 2032 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 36 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1612 wrote to memory of 1736 1612 fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe 37 PID 1604 wrote to memory of 1168 1604 explorer.exe 39 PID 1604 wrote to memory of 1168 1604 explorer.exe 39 PID 1604 wrote to memory of 1168 1604 explorer.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\LdKhI.vbs2⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Roaming\LdKhI.vbs4⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:108
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LdKhI.vbs"2⤵
- Adds Run key to start application
PID:1704
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\LdKhI.vbs"2⤵
- Adds Run key to start application
PID:1168
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
Filesize282KB
MD55a01389f7ff9377d4989af22abb57e48
SHA16e5b77d5d7969a6640a30e0252b92b3bc4df11a5
SHA256fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71
SHA5124afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa
-
C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
Filesize282KB
MD55a01389f7ff9377d4989af22abb57e48
SHA16e5b77d5d7969a6640a30e0252b92b3bc4df11a5
SHA256fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71
SHA5124afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa
-
C:\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
Filesize282KB
MD55a01389f7ff9377d4989af22abb57e48
SHA16e5b77d5d7969a6640a30e0252b92b3bc4df11a5
SHA256fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71
SHA5124afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa
-
Filesize
666B
MD5409fa21abfcd0486ea2b40807dc4ee6f
SHA1eb165dbd4008c565b0cc1ad5c2fc88cc81d733c0
SHA25618164c48099a23dd02f6f37f7af77c7a1703229f36e935aba66952452f5e3cd6
SHA51216307be496bee370234c767ef753fcf87de854a07adbd323c7a5701a4c1bc9b89466eba738aa414a50893d293fdd0afcc15908d50182b5a150db116e49911108
-
Filesize
601B
MD5dea7c7ae2418179645707fe811ccf502
SHA16f47a206259e8ae0d21bee77e6eae21ec5159570
SHA256afc65a741eba6a07a9184dd8b28baf24832eb3c1c98df223a6f1437c2ee0f964
SHA512b75054d74129b04cb97bf953238693dec713c32588c3128f24b053d70456a38109f0b350c717284b8e49ec0c83adeab4ac1280641ddaa6edb66d1585c8dc3282
-
Filesize
282KB
MD55a01389f7ff9377d4989af22abb57e48
SHA16e5b77d5d7969a6640a30e0252b92b3bc4df11a5
SHA256fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71
SHA5124afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa
-
\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
Filesize282KB
MD55a01389f7ff9377d4989af22abb57e48
SHA16e5b77d5d7969a6640a30e0252b92b3bc4df11a5
SHA256fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71
SHA5124afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa
-
\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
Filesize282KB
MD55a01389f7ff9377d4989af22abb57e48
SHA16e5b77d5d7969a6640a30e0252b92b3bc4df11a5
SHA256fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71
SHA5124afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa
-
\Users\Admin\AppData\Local\Temp\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71\fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71.exe
Filesize282KB
MD55a01389f7ff9377d4989af22abb57e48
SHA16e5b77d5d7969a6640a30e0252b92b3bc4df11a5
SHA256fdc5e4acc0deabd8ecbd9da8b895fd6636aa0b426fb10b23a94a8ab4233bee71
SHA5124afdc471f72c81988a9ed6f60dd151ac7d3b23cc2efdb711a519f42805c0ac5cde5e5200486aed978805a34b43423c8307c506606590a69158a54a3b5aa5a1aa