Analysis
-
max time kernel
45s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 14:45
Static task
static1
Behavioral task
behavioral1
Sample
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe
Resource
win7-20221111-en
General
-
Target
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe
-
Size
29KB
-
MD5
e61f2a51d5a73f72d233a22f0e0f68e0
-
SHA1
4b8316d949b5d1af88db2d8fe78d3e6dc77e685c
-
SHA256
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef
-
SHA512
bbb471b0116d64cd8d2be8f3f8288274b5d775ae08d18256b46deb034f1929cf54f31603b4df8f1531fa9181875ae173320c1faa3c28a88ff8b6e7f19d36a4ce
-
SSDEEP
768:cxCg6GBEaQ0XhoM1hy6S5n00gcAycuYlA8H6v:cxC/GBm0SM1hy6SG0gNycudF
Malware Config
Signatures
-
Possible privilege escalation attempt 6 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exepid process 1924 takeown.exe 576 icacls.exe 1768 takeown.exe 1540 icacls.exe 1840 takeown.exe 1020 icacls.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 332 cmd.exe -
Modifies file permissions 1 TTPs 6 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exepid process 1540 icacls.exe 1840 takeown.exe 1020 icacls.exe 1924 takeown.exe 576 icacls.exe 1768 takeown.exe -
Drops file in System32 directory 10 IoCs
Processes:
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exedescription ioc process File opened for modification C:\Windows\SysWOW64\123DB82.tmp e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File opened for modification C:\Windows\SysWOW64\123563E.tmp e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File opened for modification C:\Windows\SysWOW64\12361F2.tmp e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File opened for modification C:\Windows\syswow64\12361F2.tmp e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File opened for modification C:\Windows\syswow64\123DB82.tmp e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File created C:\Windows\SysWOW64\dllcache\iphlpapi.dll e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File opened for modification C:\Windows\syswow64\123563E.tmp e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File created C:\Windows\SysWOW64\dllcache\rasadhlp.dll e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe File created C:\Windows\SysWOW64\sxload.tmp e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe -
Drops file in Program Files directory 1 IoCs
Processes:
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exedescription ioc process File created C:\Program Files (x86)\Common Files\sxmy.tmp e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1632 taskkill.exe 1392 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exepid process 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exetakeown.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe Token: SeTakeOwnershipPrivilege 1924 takeown.exe Token: SeDebugPrivilege 1632 taskkill.exe Token: SeDebugPrivilege 1392 taskkill.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exepid process 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1616 wrote to memory of 888 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 888 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 888 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 888 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 888 wrote to memory of 1492 888 cmd.exe cmd.exe PID 888 wrote to memory of 1492 888 cmd.exe cmd.exe PID 888 wrote to memory of 1492 888 cmd.exe cmd.exe PID 888 wrote to memory of 1492 888 cmd.exe cmd.exe PID 1492 wrote to memory of 1924 1492 cmd.exe takeown.exe PID 1492 wrote to memory of 1924 1492 cmd.exe takeown.exe PID 1492 wrote to memory of 1924 1492 cmd.exe takeown.exe PID 1492 wrote to memory of 1924 1492 cmd.exe takeown.exe PID 888 wrote to memory of 576 888 cmd.exe icacls.exe PID 888 wrote to memory of 576 888 cmd.exe icacls.exe PID 888 wrote to memory of 576 888 cmd.exe icacls.exe PID 888 wrote to memory of 576 888 cmd.exe icacls.exe PID 1616 wrote to memory of 388 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 388 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 388 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 388 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 388 wrote to memory of 1604 388 cmd.exe cmd.exe PID 388 wrote to memory of 1604 388 cmd.exe cmd.exe PID 388 wrote to memory of 1604 388 cmd.exe cmd.exe PID 388 wrote to memory of 1604 388 cmd.exe cmd.exe PID 1604 wrote to memory of 1768 1604 cmd.exe takeown.exe PID 1604 wrote to memory of 1768 1604 cmd.exe takeown.exe PID 1604 wrote to memory of 1768 1604 cmd.exe takeown.exe PID 1604 wrote to memory of 1768 1604 cmd.exe takeown.exe PID 388 wrote to memory of 1540 388 cmd.exe icacls.exe PID 388 wrote to memory of 1540 388 cmd.exe icacls.exe PID 388 wrote to memory of 1540 388 cmd.exe icacls.exe PID 388 wrote to memory of 1540 388 cmd.exe icacls.exe PID 1616 wrote to memory of 1880 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 1880 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 1880 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 1880 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1880 wrote to memory of 908 1880 cmd.exe cmd.exe PID 1880 wrote to memory of 908 1880 cmd.exe cmd.exe PID 1880 wrote to memory of 908 1880 cmd.exe cmd.exe PID 1880 wrote to memory of 908 1880 cmd.exe cmd.exe PID 908 wrote to memory of 1840 908 cmd.exe takeown.exe PID 908 wrote to memory of 1840 908 cmd.exe takeown.exe PID 908 wrote to memory of 1840 908 cmd.exe takeown.exe PID 908 wrote to memory of 1840 908 cmd.exe takeown.exe PID 1880 wrote to memory of 1020 1880 cmd.exe icacls.exe PID 1880 wrote to memory of 1020 1880 cmd.exe icacls.exe PID 1880 wrote to memory of 1020 1880 cmd.exe icacls.exe PID 1880 wrote to memory of 1020 1880 cmd.exe icacls.exe PID 1616 wrote to memory of 1632 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe taskkill.exe PID 1616 wrote to memory of 1632 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe taskkill.exe PID 1616 wrote to memory of 1632 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe taskkill.exe PID 1616 wrote to memory of 1632 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe taskkill.exe PID 1616 wrote to memory of 1392 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe taskkill.exe PID 1616 wrote to memory of 1392 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe taskkill.exe PID 1616 wrote to memory of 1392 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe taskkill.exe PID 1616 wrote to memory of 1392 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe taskkill.exe PID 1616 wrote to memory of 332 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 332 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 332 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe PID 1616 wrote to memory of 332 1616 e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe"C:\Users\Admin\AppData\Local\Temp\e27c3a1c932d7a7ad7df5ca65fb06a73caaa24c12bfba50e466f597d7fd5e3ef.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f "C:\Windows\syswow64"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\syswow64"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\syswow64" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f "C:\Windows\syswow64"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\syswow64"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\syswow64" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f "C:\Windows\syswow64"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\syswow64"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\syswow64" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "soul.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "soul.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c 1.bat2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1.batFilesize
253B
MD5a585ef13f0cb8cb72f430f6f36262b89
SHA1431b0bbaa52f8a58aefe800996646f0854dc51e1
SHA2561ae31ab07f3717b019a2495498baa63b253230ccde64756e6b718a811d162bc1
SHA51263482056d1dea223c221989c6e546d2953ec76cc999c87c383ecc57fcaa4f248967cc4ea7e3c4eb10b4e3ceccebfb740db796e3dc3b4f76e09614fd949a3e12d
-
C:\Users\Admin\AppData\Local\Temp\2.batFilesize
110B
MD5521e37256443e6b3f2281f217476bf79
SHA181f0e2b65605f070782cbe241569c6b9a25bb9dc
SHA25679ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f
SHA51223096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025
-
C:\Users\Admin\AppData\Local\Temp\2.batFilesize
110B
MD5521e37256443e6b3f2281f217476bf79
SHA181f0e2b65605f070782cbe241569c6b9a25bb9dc
SHA25679ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f
SHA51223096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025
-
C:\Users\Admin\AppData\Local\Temp\2.batFilesize
110B
MD5521e37256443e6b3f2281f217476bf79
SHA181f0e2b65605f070782cbe241569c6b9a25bb9dc
SHA25679ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f
SHA51223096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025
-
C:\Windows\SysWOW64\dllcache\iphlpapi.dllFilesize
101KB
MD50894ff9cb2f6ac6696b04351f5bfc422
SHA1fa02fb7e2b343b7d467675a81afd088c877d641f
SHA256f63abb152ab1ee993236a7b1b30b0b40be2aeab0edee9eb52fc465695190bb88
SHA512493c7fa3cfb938c3b98704baad0be2519787cce465ee344fcd6450c5707b3d3bd0a834d35c33947b8a4dd95a2178b4dab0f5668abc8995dc4965532d5b8c33b7
-
C:\Windows\SysWOW64\dllcache\rasadhlp.dllFilesize
11KB
MD5f87a749e97c7a8c63406321aa604498f
SHA15da6a31742558d3f5e9ccde10304012230d2e0a7
SHA256c54a7f4a32e9f6d19dbd80a7a52ea54f689956ee25e42bb6a168dc0ca3dd5946
SHA51273fad4c4f9fb08a2a6ecc82695f18266600ad954ac50056c0db83c2dd3c5171c64e33bcced26ba06c9994c172d7c4c6fd979cd9d795e107f0bc28baa3becc97b
-
C:\Windows\SysWOW64\iphlpapi.dllFilesize
101KB
MD50894ff9cb2f6ac6696b04351f5bfc422
SHA1fa02fb7e2b343b7d467675a81afd088c877d641f
SHA256f63abb152ab1ee993236a7b1b30b0b40be2aeab0edee9eb52fc465695190bb88
SHA512493c7fa3cfb938c3b98704baad0be2519787cce465ee344fcd6450c5707b3d3bd0a834d35c33947b8a4dd95a2178b4dab0f5668abc8995dc4965532d5b8c33b7
-
C:\Windows\SysWOW64\rasadhlp.dllFilesize
11KB
MD5f87a749e97c7a8c63406321aa604498f
SHA15da6a31742558d3f5e9ccde10304012230d2e0a7
SHA256c54a7f4a32e9f6d19dbd80a7a52ea54f689956ee25e42bb6a168dc0ca3dd5946
SHA51273fad4c4f9fb08a2a6ecc82695f18266600ad954ac50056c0db83c2dd3c5171c64e33bcced26ba06c9994c172d7c4c6fd979cd9d795e107f0bc28baa3becc97b
-
memory/332-85-0x0000000000000000-mapping.dmp
-
memory/388-63-0x0000000000000000-mapping.dmp
-
memory/576-59-0x0000000000000000-mapping.dmp
-
memory/888-55-0x0000000000000000-mapping.dmp
-
memory/908-75-0x0000000000000000-mapping.dmp
-
memory/1020-77-0x0000000000000000-mapping.dmp
-
memory/1392-84-0x0000000000000000-mapping.dmp
-
memory/1492-57-0x0000000000000000-mapping.dmp
-
memory/1540-67-0x0000000000000000-mapping.dmp
-
memory/1604-65-0x0000000000000000-mapping.dmp
-
memory/1616-70-0x0000000073FB1000-0x0000000073FB3000-memory.dmpFilesize
8KB
-
memory/1616-54-0x0000000075701000-0x0000000075703000-memory.dmpFilesize
8KB
-
memory/1616-61-0x0000000073FE1000-0x0000000073FE3000-memory.dmpFilesize
8KB
-
memory/1616-60-0x0000000074191000-0x0000000074193000-memory.dmpFilesize
8KB
-
memory/1632-83-0x0000000000000000-mapping.dmp
-
memory/1768-66-0x0000000000000000-mapping.dmp
-
memory/1840-76-0x0000000000000000-mapping.dmp
-
memory/1880-73-0x0000000000000000-mapping.dmp
-
memory/1924-58-0x0000000000000000-mapping.dmp