Analysis
-
max time kernel
32s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 14:52
Static task
static1
Behavioral task
behavioral1
Sample
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe
Resource
win7-20221111-en
General
-
Target
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe
-
Size
26KB
-
MD5
2f900ad4ecd1726c9001bc41a42073cc
-
SHA1
98eda90f954cd3dc68fe58e8b9738487256e66c3
-
SHA256
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce
-
SHA512
bb99fba927b802eb25ab0672b2eeefdfb56c18e763e7b202ef6bd0cc7a824583f00b6df5f947bd6fce23be957f4af0e133fbfefc6f7c553356c460badb19735a
-
SSDEEP
384:fiwLXY3y9eHBgVmtCFbxRbA+4okzNC6ybGMhTKNljsq+Vhnka0+itIY/JLjP4L3W:fixCg6tdRbA+4CBbhKNWqc++it7R23W
Malware Config
Signatures
-
Possible privilege escalation attempt 6 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exepid process 1672 icacls.exe 1808 takeown.exe 1324 icacls.exe 1164 takeown.exe 2036 icacls.exe 1864 takeown.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1392 cmd.exe -
Modifies file permissions 1 TTPs 6 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exepid process 1808 takeown.exe 1324 icacls.exe 1164 takeown.exe 2036 icacls.exe 1864 takeown.exe 1672 icacls.exe -
Drops file in System32 directory 10 IoCs
Processes:
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exedescription ioc process File opened for modification C:\Windows\SysWOW64\123A6EB.tmp 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File created C:\Windows\SysWOW64\dllcache\iphlpapi.dll 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File opened for modification C:\Windows\SysWOW64\123E1AB.tmp 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File opened for modification C:\Windows\syswow64\123E1AB.tmp 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File opened for modification C:\Windows\syswow64\123320.tmp 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File opened for modification C:\Windows\syswow64\123A6EB.tmp 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File created C:\Windows\SysWOW64\dllcache\rasadhlp.dll 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File opened for modification C:\Windows\SysWOW64\123320.tmp 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File created C:\Windows\SysWOW64\dllcache\midimap.dll 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe File created C:\Windows\SysWOW64\sxload.tmp 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe -
Drops file in Program Files directory 1 IoCs
Processes:
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exedescription ioc process File created C:\Program Files (x86)\Common Files\sxmy.tmp 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1496 taskkill.exe 1928 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exepid process 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exetakeown.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe Token: SeTakeOwnershipPrivilege 1164 takeown.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 1928 taskkill.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exepid process 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 952 wrote to memory of 900 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 900 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 900 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 900 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 900 wrote to memory of 672 900 cmd.exe cmd.exe PID 900 wrote to memory of 672 900 cmd.exe cmd.exe PID 900 wrote to memory of 672 900 cmd.exe cmd.exe PID 900 wrote to memory of 672 900 cmd.exe cmd.exe PID 672 wrote to memory of 1164 672 cmd.exe takeown.exe PID 672 wrote to memory of 1164 672 cmd.exe takeown.exe PID 672 wrote to memory of 1164 672 cmd.exe takeown.exe PID 672 wrote to memory of 1164 672 cmd.exe takeown.exe PID 900 wrote to memory of 2036 900 cmd.exe icacls.exe PID 900 wrote to memory of 2036 900 cmd.exe icacls.exe PID 900 wrote to memory of 2036 900 cmd.exe icacls.exe PID 900 wrote to memory of 2036 900 cmd.exe icacls.exe PID 952 wrote to memory of 1780 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 1780 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 1780 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 1780 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 1780 wrote to memory of 1512 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 1512 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 1512 1780 cmd.exe cmd.exe PID 1780 wrote to memory of 1512 1780 cmd.exe cmd.exe PID 1512 wrote to memory of 1864 1512 cmd.exe takeown.exe PID 1512 wrote to memory of 1864 1512 cmd.exe takeown.exe PID 1512 wrote to memory of 1864 1512 cmd.exe takeown.exe PID 1512 wrote to memory of 1864 1512 cmd.exe takeown.exe PID 1780 wrote to memory of 1672 1780 cmd.exe icacls.exe PID 1780 wrote to memory of 1672 1780 cmd.exe icacls.exe PID 1780 wrote to memory of 1672 1780 cmd.exe icacls.exe PID 1780 wrote to memory of 1672 1780 cmd.exe icacls.exe PID 952 wrote to memory of 608 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 608 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 608 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 608 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 608 wrote to memory of 1456 608 cmd.exe cmd.exe PID 608 wrote to memory of 1456 608 cmd.exe cmd.exe PID 608 wrote to memory of 1456 608 cmd.exe cmd.exe PID 608 wrote to memory of 1456 608 cmd.exe cmd.exe PID 1456 wrote to memory of 1808 1456 cmd.exe takeown.exe PID 1456 wrote to memory of 1808 1456 cmd.exe takeown.exe PID 1456 wrote to memory of 1808 1456 cmd.exe takeown.exe PID 1456 wrote to memory of 1808 1456 cmd.exe takeown.exe PID 608 wrote to memory of 1324 608 cmd.exe icacls.exe PID 608 wrote to memory of 1324 608 cmd.exe icacls.exe PID 608 wrote to memory of 1324 608 cmd.exe icacls.exe PID 608 wrote to memory of 1324 608 cmd.exe icacls.exe PID 952 wrote to memory of 1496 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe taskkill.exe PID 952 wrote to memory of 1496 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe taskkill.exe PID 952 wrote to memory of 1496 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe taskkill.exe PID 952 wrote to memory of 1496 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe taskkill.exe PID 952 wrote to memory of 1928 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe taskkill.exe PID 952 wrote to memory of 1928 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe taskkill.exe PID 952 wrote to memory of 1928 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe taskkill.exe PID 952 wrote to memory of 1928 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe taskkill.exe PID 952 wrote to memory of 1392 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 1392 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 1392 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe PID 952 wrote to memory of 1392 952 72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe"C:\Users\Admin\AppData\Local\Temp\72bb16b9c12138cdacbd260e8176acd8d2e4dee422c384e7251ffefa04cf6fce.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f "C:\Windows\syswow64"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\syswow64"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\syswow64" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f "C:\Windows\syswow64"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\syswow64"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\syswow64" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\cmd.execmd /c 2.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c takeown /f "C:\Windows\syswow64"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\syswow64"4⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\syswow64" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "soul.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "soul.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c 1.bat2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1.batFilesize
253B
MD5dfa62139605a98aa1859c623a9aaf1ca
SHA1917a4320fd269c31126cd069726218d0766f32b1
SHA25675817b09fa299fa35a04be611efe35a237a6ce0b690d3f9d2fce838b33d6ba6e
SHA51240e9e7ea282a036831dd81195b9703949abcc6d7052c0f272430dedf1ac9e3592f0cd97aa5b009306a88967b44bd45e01ec838f53819aec5bbae7f12e148c8bb
-
C:\Users\Admin\AppData\Local\Temp\2.batFilesize
110B
MD5521e37256443e6b3f2281f217476bf79
SHA181f0e2b65605f070782cbe241569c6b9a25bb9dc
SHA25679ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f
SHA51223096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025
-
C:\Users\Admin\AppData\Local\Temp\2.batFilesize
110B
MD5521e37256443e6b3f2281f217476bf79
SHA181f0e2b65605f070782cbe241569c6b9a25bb9dc
SHA25679ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f
SHA51223096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025
-
C:\Users\Admin\AppData\Local\Temp\2.batFilesize
110B
MD5521e37256443e6b3f2281f217476bf79
SHA181f0e2b65605f070782cbe241569c6b9a25bb9dc
SHA25679ae97b29c3a714fa32b14c282716f1378ad8de73d6a6d954fdd7e1270bc411f
SHA51223096a5eee45c7f2b278cf9385a0ea91b86c01332a096e56f1c8de336ca0bba77e0b1dbb6f2197b5c6a91c2ca093df356026c6452e4a022db79a6b555cb39025
-
C:\Windows\SysWOW64\dllcache\iphlpapi.dllFilesize
101KB
MD50894ff9cb2f6ac6696b04351f5bfc422
SHA1fa02fb7e2b343b7d467675a81afd088c877d641f
SHA256f63abb152ab1ee993236a7b1b30b0b40be2aeab0edee9eb52fc465695190bb88
SHA512493c7fa3cfb938c3b98704baad0be2519787cce465ee344fcd6450c5707b3d3bd0a834d35c33947b8a4dd95a2178b4dab0f5668abc8995dc4965532d5b8c33b7
-
C:\Windows\SysWOW64\dllcache\rasadhlp.dllFilesize
11KB
MD5f87a749e97c7a8c63406321aa604498f
SHA15da6a31742558d3f5e9ccde10304012230d2e0a7
SHA256c54a7f4a32e9f6d19dbd80a7a52ea54f689956ee25e42bb6a168dc0ca3dd5946
SHA51273fad4c4f9fb08a2a6ecc82695f18266600ad954ac50056c0db83c2dd3c5171c64e33bcced26ba06c9994c172d7c4c6fd979cd9d795e107f0bc28baa3becc97b
-
C:\Windows\SysWOW64\iphlpapi.dllFilesize
101KB
MD50894ff9cb2f6ac6696b04351f5bfc422
SHA1fa02fb7e2b343b7d467675a81afd088c877d641f
SHA256f63abb152ab1ee993236a7b1b30b0b40be2aeab0edee9eb52fc465695190bb88
SHA512493c7fa3cfb938c3b98704baad0be2519787cce465ee344fcd6450c5707b3d3bd0a834d35c33947b8a4dd95a2178b4dab0f5668abc8995dc4965532d5b8c33b7
-
C:\Windows\SysWOW64\rasadhlp.dllFilesize
11KB
MD5f87a749e97c7a8c63406321aa604498f
SHA15da6a31742558d3f5e9ccde10304012230d2e0a7
SHA256c54a7f4a32e9f6d19dbd80a7a52ea54f689956ee25e42bb6a168dc0ca3dd5946
SHA51273fad4c4f9fb08a2a6ecc82695f18266600ad954ac50056c0db83c2dd3c5171c64e33bcced26ba06c9994c172d7c4c6fd979cd9d795e107f0bc28baa3becc97b
-
memory/608-70-0x0000000000000000-mapping.dmp
-
memory/672-57-0x0000000000000000-mapping.dmp
-
memory/900-55-0x0000000000000000-mapping.dmp
-
memory/952-60-0x0000000074F71000-0x0000000074F73000-memory.dmpFilesize
8KB
-
memory/952-67-0x0000000074C31000-0x0000000074C33000-memory.dmpFilesize
8KB
-
memory/952-54-0x0000000075DA1000-0x0000000075DA3000-memory.dmpFilesize
8KB
-
memory/952-77-0x0000000074C71000-0x0000000074C73000-memory.dmpFilesize
8KB
-
memory/1164-58-0x0000000000000000-mapping.dmp
-
memory/1324-74-0x0000000000000000-mapping.dmp
-
memory/1392-82-0x0000000000000000-mapping.dmp
-
memory/1456-72-0x0000000000000000-mapping.dmp
-
memory/1496-80-0x0000000000000000-mapping.dmp
-
memory/1512-63-0x0000000000000000-mapping.dmp
-
memory/1672-65-0x0000000000000000-mapping.dmp
-
memory/1780-61-0x0000000000000000-mapping.dmp
-
memory/1808-73-0x0000000000000000-mapping.dmp
-
memory/1864-64-0x0000000000000000-mapping.dmp
-
memory/1928-81-0x0000000000000000-mapping.dmp
-
memory/2036-59-0x0000000000000000-mapping.dmp