Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999.exe
Resource
win10v2004-20221111-en
General
-
Target
57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999.exe
-
Size
30KB
-
MD5
ab89f168dcff025b5c0220cb508060d1
-
SHA1
6db122e9bfdcd6efa1ae0ca5b82e4e7f9be567e0
-
SHA256
57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999
-
SHA512
6d3939fccc0ff41404416fbbc1972b1b2bdd51a60f11f810da57bec1d8781ccf714b9770b3a2b51139903119666355f980261e6dd60a8eb775a8a9719801d8c7
-
SSDEEP
384:wAx0nuJ3wZ9x7rHt6/iLVMVpUGAHT6Pq2XFg82G5Fk4tZS0QL5PyN:wfnuxIjz6VpUGAHT6PTuXAtLK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1188 cmss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 656 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e3865612041fb427745f1ab700d503ae.exe cmss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e3865612041fb427745f1ab700d503ae.exe cmss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\e3865612041fb427745f1ab700d503ae = "\"C:\\Users\\Admin\\AppData\\Roaming\\cmss.exe\" .." cmss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e3865612041fb427745f1ab700d503ae = "\"C:\\Users\\Admin\\AppData\\Roaming\\cmss.exe\" .." cmss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe Token: 33 1188 cmss.exe Token: SeIncBasePriorityPrivilege 1188 cmss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1188 1532 57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999.exe 28 PID 1532 wrote to memory of 1188 1532 57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999.exe 28 PID 1532 wrote to memory of 1188 1532 57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999.exe 28 PID 1188 wrote to memory of 656 1188 cmss.exe 29 PID 1188 wrote to memory of 656 1188 cmss.exe 29 PID 1188 wrote to memory of 656 1188 cmss.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999.exe"C:\Users\Admin\AppData\Local\Temp\57f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\cmss.exe"C:\Users\Admin\AppData\Roaming\cmss.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\cmss.exe" "cmss.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:656
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5ab89f168dcff025b5c0220cb508060d1
SHA16db122e9bfdcd6efa1ae0ca5b82e4e7f9be567e0
SHA25657f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999
SHA5126d3939fccc0ff41404416fbbc1972b1b2bdd51a60f11f810da57bec1d8781ccf714b9770b3a2b51139903119666355f980261e6dd60a8eb775a8a9719801d8c7
-
Filesize
30KB
MD5ab89f168dcff025b5c0220cb508060d1
SHA16db122e9bfdcd6efa1ae0ca5b82e4e7f9be567e0
SHA25657f548a6fe2ba7f9920d754442796d2859d52bfa01ce7bba903f403ca5340999
SHA5126d3939fccc0ff41404416fbbc1972b1b2bdd51a60f11f810da57bec1d8781ccf714b9770b3a2b51139903119666355f980261e6dd60a8eb775a8a9719801d8c7