Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe
Resource
win10v2004-20220812-en
General
-
Target
3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe
-
Size
2.3MB
-
MD5
ea1bd8d4c124a30597e9af5fccec713c
-
SHA1
93391ddfec1d03eebea4c64a6cc75955e46721fa
-
SHA256
3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f
-
SHA512
f2b728e946bbc35790c9aaf9db9eb2fb26e82d0b7bc1fa0f5b2ec0a0d7767895b3d36c7fe7d29b2d9ab0ecd1a4aa1551e727ff52da782647c5b90f99e641d266
-
SSDEEP
49152:Nz+9e4HRWqP642vm9ktGACKlFBUh9UsYKoEx+TL3A:Nzge2R9P642+itGoFBM6jrw
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DCOM Service Manager = "C:\\Users\\Admin\\AppData\\Roaming\\WinDCOMSvcMgrV8\\windcomsvc.exe" 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe -
Executes dropped EXE 1 IoCs
pid Process 544 windcomsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RUN 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe Key deleted \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RUNONCE 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\DCOM Service Manager = "C:\\Users\\Admin\\AppData\\Roaming\\WinDCOMSvcMgrV8\\windcomsvc.exe" 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 544 windcomsvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 544 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 27 PID 2032 wrote to memory of 544 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 27 PID 2032 wrote to memory of 544 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 27 PID 2032 wrote to memory of 544 2032 3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe"C:\Users\Admin\AppData\Local\Temp\3f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\WinDCOMSvcMgrV8\windcomsvc.exe"C:\Users\Admin\AppData\Roaming\WinDCOMSvcMgrV8\windcomsvc.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5ea1bd8d4c124a30597e9af5fccec713c
SHA193391ddfec1d03eebea4c64a6cc75955e46721fa
SHA2563f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f
SHA512f2b728e946bbc35790c9aaf9db9eb2fb26e82d0b7bc1fa0f5b2ec0a0d7767895b3d36c7fe7d29b2d9ab0ecd1a4aa1551e727ff52da782647c5b90f99e641d266
-
Filesize
2.3MB
MD5ea1bd8d4c124a30597e9af5fccec713c
SHA193391ddfec1d03eebea4c64a6cc75955e46721fa
SHA2563f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f
SHA512f2b728e946bbc35790c9aaf9db9eb2fb26e82d0b7bc1fa0f5b2ec0a0d7767895b3d36c7fe7d29b2d9ab0ecd1a4aa1551e727ff52da782647c5b90f99e641d266
-
Filesize
2.3MB
MD5ea1bd8d4c124a30597e9af5fccec713c
SHA193391ddfec1d03eebea4c64a6cc75955e46721fa
SHA2563f502e2a2363224c7f51aeaeb47fde64b996e1c0bdb68809e426814cccbf5c4f
SHA512f2b728e946bbc35790c9aaf9db9eb2fb26e82d0b7bc1fa0f5b2ec0a0d7767895b3d36c7fe7d29b2d9ab0ecd1a4aa1551e727ff52da782647c5b90f99e641d266