Analysis
-
max time kernel
149s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 07:42
Static task
static1
Behavioral task
behavioral1
Sample
7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe
Resource
win10v2004-20220812-en
General
-
Target
7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe
-
Size
383KB
-
MD5
1eb752dcbc0e63ce7552c3d1e5145162
-
SHA1
19fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
-
SHA256
7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
-
SHA512
c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
SSDEEP
6144:fxQiSTSvLmEo8NalPlNYEKjW9jf+SSMRlJ888888888888W88888888888:ZST03U1ZKsjfbSMt888888888888W88c
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 624 dbeedafcd.exe 1656 cefcdeebc.exe -
Loads dropped DLL 4 IoCs
pid Process 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cefcdeebc = "C:\\Users\\Admin\\AppData\\Roaming\\cefcdeebc.exe" cefcdeebc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dbeedafcd = "C:\\Users\\Admin\\AppData\\Roaming\\dbeedafcd.exe" 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cefcdeebc = "C:\\Users\\Admin\\AppData\\Roaming\\cefcdeebc.exe" dbeedafcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cefcdeebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dbeedafcd = "C:\\Users\\Admin\\AppData\\Roaming\\dbeedafcd.exe" cefcdeebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cefcdeebc = "C:\\Users\\Admin\\AppData\\Roaming\\cefcdeebc.exe" 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run dbeedafcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dbeedafcd = "C:\\Users\\Admin\\AppData\\Roaming\\dbeedafcd.exe" dbeedafcd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe 1656 cefcdeebc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1716 wrote to memory of 624 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 28 PID 1716 wrote to memory of 624 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 28 PID 1716 wrote to memory of 624 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 28 PID 1716 wrote to memory of 624 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 28 PID 1716 wrote to memory of 1656 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 29 PID 1716 wrote to memory of 1656 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 29 PID 1716 wrote to memory of 1656 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 29 PID 1716 wrote to memory of 1656 1716 7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe"C:\Users\Admin\AppData\Local\Temp\7c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\dbeedafcd.exe"C:\Users\Admin\AppData\Roaming\dbeedafcd.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:624
-
-
C:\Users\Admin\AppData\Roaming\cefcdeebc.exe"C:\Users\Admin\AppData\Roaming\cefcdeebc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137
-
Filesize
383KB
MD51eb752dcbc0e63ce7552c3d1e5145162
SHA119fc1ac079d4153e07fde17ef7f9dcfd6fd96b2f
SHA2567c165857bf7d55f9727f6aedad8afe4e5dab1a0a555a6496573ea57b6add93f8
SHA512c41dfe311258569bd1ce5bc12ee11bf22a66f5d9e67429396a0c778381a22638b920e7bbdf5c3df6c2bd070a8720083065e28ecce9370193acadf4fc543fc137