Analysis
-
max time kernel
33s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe
Resource
win10v2004-20220812-en
General
-
Target
eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe
-
Size
307KB
-
MD5
8080ab595477d98b701898f7ca034d2f
-
SHA1
47e3549486cf5684cdf56fe0ad4479ee7faf419e
-
SHA256
eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf
-
SHA512
68d3ef3d955b146d941c4d5c2e86638c3063396222b045e30af6f74ec31767af80150b474241b2c68593fd910c6397fabaab870c661a30dbf2cd8dc4263fdb1e
-
SSDEEP
6144:jyVOZ+OUalNEjBU18BEUuPSo6I3xhBeOxRoMy:/ZJUINoB5nIhhBeOxZy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1692 awdlryfn.exe -
Deletes itself 1 IoCs
pid Process 1916 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1916 cmd.exe 1916 cmd.exe 1692 awdlryfn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1696 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1132 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1696 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1916 1016 eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe 28 PID 1016 wrote to memory of 1916 1016 eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe 28 PID 1016 wrote to memory of 1916 1016 eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe 28 PID 1016 wrote to memory of 1916 1016 eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe 28 PID 1916 wrote to memory of 1696 1916 cmd.exe 30 PID 1916 wrote to memory of 1696 1916 cmd.exe 30 PID 1916 wrote to memory of 1696 1916 cmd.exe 30 PID 1916 wrote to memory of 1696 1916 cmd.exe 30 PID 1916 wrote to memory of 1132 1916 cmd.exe 32 PID 1916 wrote to memory of 1132 1916 cmd.exe 32 PID 1916 wrote to memory of 1132 1916 cmd.exe 32 PID 1916 wrote to memory of 1132 1916 cmd.exe 32 PID 1916 wrote to memory of 1692 1916 cmd.exe 33 PID 1916 wrote to memory of 1692 1916 cmd.exe 33 PID 1916 wrote to memory of 1692 1916 cmd.exe 33 PID 1916 wrote to memory of 1692 1916 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe"C:\Users\Admin\AppData\Local\Temp\eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1016 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf.exe" & start C:\Users\Admin\AppData\Local\awdlryfn.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 10163⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:1132
-
-
C:\Users\Admin\AppData\Local\awdlryfn.exeC:\Users\Admin\AppData\Local\awdlryfn.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD58080ab595477d98b701898f7ca034d2f
SHA147e3549486cf5684cdf56fe0ad4479ee7faf419e
SHA256eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf
SHA51268d3ef3d955b146d941c4d5c2e86638c3063396222b045e30af6f74ec31767af80150b474241b2c68593fd910c6397fabaab870c661a30dbf2cd8dc4263fdb1e
-
Filesize
307KB
MD58080ab595477d98b701898f7ca034d2f
SHA147e3549486cf5684cdf56fe0ad4479ee7faf419e
SHA256eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf
SHA51268d3ef3d955b146d941c4d5c2e86638c3063396222b045e30af6f74ec31767af80150b474241b2c68593fd910c6397fabaab870c661a30dbf2cd8dc4263fdb1e
-
Filesize
307KB
MD58080ab595477d98b701898f7ca034d2f
SHA147e3549486cf5684cdf56fe0ad4479ee7faf419e
SHA256eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf
SHA51268d3ef3d955b146d941c4d5c2e86638c3063396222b045e30af6f74ec31767af80150b474241b2c68593fd910c6397fabaab870c661a30dbf2cd8dc4263fdb1e
-
Filesize
307KB
MD58080ab595477d98b701898f7ca034d2f
SHA147e3549486cf5684cdf56fe0ad4479ee7faf419e
SHA256eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf
SHA51268d3ef3d955b146d941c4d5c2e86638c3063396222b045e30af6f74ec31767af80150b474241b2c68593fd910c6397fabaab870c661a30dbf2cd8dc4263fdb1e
-
Filesize
307KB
MD58080ab595477d98b701898f7ca034d2f
SHA147e3549486cf5684cdf56fe0ad4479ee7faf419e
SHA256eff5c0fc6fa66700c0aae9c6f457952ff5a5ddc8d184dd3c5ccd86f4cc6f9dcf
SHA51268d3ef3d955b146d941c4d5c2e86638c3063396222b045e30af6f74ec31767af80150b474241b2c68593fd910c6397fabaab870c661a30dbf2cd8dc4263fdb1e