Analysis
-
max time kernel
123s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 07:32
Behavioral task
behavioral1
Sample
1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe
Resource
win10v2004-20220812-en
General
-
Target
1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe
-
Size
506KB
-
MD5
9f2eb04e92a19b2dbb3a351f229f0795
-
SHA1
c2aeb031c54c7c5c889d2666778afe9971348315
-
SHA256
1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451
-
SHA512
3f2078057e8bd9220ad15877327ad89ebed2e6fcfbd6b3b39438bd0015d3ef768d89e7540491bcbff3fd54adb16393c24eb2194a3f51c092e8ab7c1c97cc5a1d
-
SSDEEP
12288:ZzYwKuEYUhoMO+xxmYrkwDDV69J/LGqnfBFun5C5fP7ZWToUvJF:1sZYUhoM/LmKo/fnfBFACiPL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1176 irsy.exe 724 irsy.exe -
resource yara_rule behavioral1/memory/832-66-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/files/0x00090000000122dc-71.dat upx behavioral1/files/0x00090000000122dc-73.dat upx behavioral1/files/0x00090000000122dc-75.dat upx behavioral1/memory/1176-89-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/files/0x00090000000122dc-87.dat upx -
Deletes itself 1 IoCs
pid Process 1788 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\Currentversion\Run explorer.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/832-66-0x0000000000400000-0x00000000004B3000-memory.dmp autoit_exe behavioral1/memory/1176-89-0x0000000000400000-0x00000000004B3000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 832 set thread context of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 1176 set thread context of 724 1176 irsy.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\28DD0F78-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 724 irsy.exe 724 irsy.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe Token: SeManageVolumePrivilege 1756 WinMail.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1756 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1756 WinMail.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 832 wrote to memory of 1240 832 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 28 PID 1240 wrote to memory of 1176 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 29 PID 1240 wrote to memory of 1176 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 29 PID 1240 wrote to memory of 1176 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 29 PID 1240 wrote to memory of 1176 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 29 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1176 wrote to memory of 724 1176 irsy.exe 30 PID 1240 wrote to memory of 1788 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 31 PID 1240 wrote to memory of 1788 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 31 PID 1240 wrote to memory of 1788 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 31 PID 1240 wrote to memory of 1788 1240 1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe 31 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 724 wrote to memory of 572 724 irsy.exe 33 PID 572 wrote to memory of 1208 572 explorer.exe 17 PID 572 wrote to memory of 1208 572 explorer.exe 17 PID 572 wrote to memory of 1208 572 explorer.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe"C:\Users\Admin\AppData\Local\Temp\1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe"C:\Users\Admin\AppData\Local\Temp\1607268ef2fa78fbf22c9d504a0add52ffe84acbba6a10c0c53b90e70fc26451.exe"3⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\Ezegpo\irsy.exe"C:\Users\Admin\AppData\Roaming\Ezegpo\irsy.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Roaming\Ezegpo\irsy.exe"C:\Users\Admin\AppData\Roaming\Ezegpo\irsy.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:572
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp3f0a46e9.bat"4⤵
- Deletes itself
PID:1788
-
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5a8fb9a340407f57b0c1f110c02718ed9
SHA1d2b5f0aeaa5566e92b905b5d74ecd5bc5606201e
SHA256cc7bb2e97ba52eeafdc4d118b763c9f048492d20141728f7a8da1f8af4f6c0e9
SHA5128388b7bda61614a14e9019cfaf01d61d7b4ab8748fcd8b9cbe7e38ad6dbddaff8e00fe37131d0aaf3c120febb930da0ffd1f9468612503685d48dd98ea98737f
-
Filesize
307B
MD5d51bebf61048e4eb4adff0b4b09f38a1
SHA15dce46d3c208c97ca6fe6d57d862f37b9f231650
SHA256a42de4930ccb869203a6f89a04c5f9a443255876c08d876a9a17b50b198ab6f8
SHA5127e0e231dec5a8bbc6ccda22af546ba8c46959b729140886d17e7190322d1e55e3de09d9911796a6aa2ca0ed2f2c8d483f1a7d5918652ac3aadde11c825ad48ad
-
Filesize
506KB
MD5ea2eb5981de4628eaea262ac45166bac
SHA1590936f4e5252dd1dc319b7bd8439a1879f6be43
SHA256c5041e53406fcd3f84086a5fd9ab9fde3a76fa6e405ec07fa13162421e769556
SHA5124a77b60777d442f23a8f4c9c35e7e00cfd2e059b0b1fc00c6369ff4624e84f8cec2473917d9878ce6f564aeac6dc343206cd02e591b0cc6281b024717aa9e3c7
-
Filesize
506KB
MD5ea2eb5981de4628eaea262ac45166bac
SHA1590936f4e5252dd1dc319b7bd8439a1879f6be43
SHA256c5041e53406fcd3f84086a5fd9ab9fde3a76fa6e405ec07fa13162421e769556
SHA5124a77b60777d442f23a8f4c9c35e7e00cfd2e059b0b1fc00c6369ff4624e84f8cec2473917d9878ce6f564aeac6dc343206cd02e591b0cc6281b024717aa9e3c7
-
Filesize
506KB
MD5ea2eb5981de4628eaea262ac45166bac
SHA1590936f4e5252dd1dc319b7bd8439a1879f6be43
SHA256c5041e53406fcd3f84086a5fd9ab9fde3a76fa6e405ec07fa13162421e769556
SHA5124a77b60777d442f23a8f4c9c35e7e00cfd2e059b0b1fc00c6369ff4624e84f8cec2473917d9878ce6f564aeac6dc343206cd02e591b0cc6281b024717aa9e3c7
-
Filesize
506KB
MD5ea2eb5981de4628eaea262ac45166bac
SHA1590936f4e5252dd1dc319b7bd8439a1879f6be43
SHA256c5041e53406fcd3f84086a5fd9ab9fde3a76fa6e405ec07fa13162421e769556
SHA5124a77b60777d442f23a8f4c9c35e7e00cfd2e059b0b1fc00c6369ff4624e84f8cec2473917d9878ce6f564aeac6dc343206cd02e591b0cc6281b024717aa9e3c7