Analysis
-
max time kernel
217s -
max time network
256s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe
Resource
win10v2004-20221111-en
General
-
Target
67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe
-
Size
270KB
-
MD5
0111a3fd57e598b4ebd70cc880a1ec0d
-
SHA1
f00c1358d5e4cde4f4cabb115f0616ee4f90cfd1
-
SHA256
67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca
-
SHA512
4b4f8ad8a8fc0c4d7646794dfcaf4ddc22ef8fd773eb40de22483ca87e358e4b41f82ae8651db4b3ccd1c312a6c5fb17f4101aecb9e73a25e5aeae668731616b
-
SSDEEP
6144:YBYOwhNRKosFBqNdzYerZW7m3qAdOdOXRoolVRK4+shxgNCop:YBYTNITKdYEZW7m3q2r6oBhCCop
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 468 212.exe 1808 213.exe -
Loads dropped DLL 12 IoCs
pid Process 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run 213.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wiseman = "C:\\Program Files (x86)\\sedhrgc\\213.exe" 213.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1cp0b0yZ = "rundll32.exe C:\\YUXSBf\\1cp0b0yZ.dll,Linsibao" 212.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\syotom = "C:\\Windows\\SysWOW64\\svchost.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1420 set thread context of 1668 1420 rundll32.exe 33 -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\sedhrgc\212.exe 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe File created C:\Program Files (x86)\sedhrgc\213.exe 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe File opened for modification C:\Program Files (x86)\sedhrgc\213.exe 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe File opened for modification C:\Program Files (x86)\sedhrgc 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe File created C:\Program Files (x86)\sedhrgc\__tmp_rar_sfx_access_check_7217074 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe File created C:\Program Files (x86)\sedhrgc\212.exe 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1808 213.exe 1808 213.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1068 wrote to memory of 468 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 28 PID 1068 wrote to memory of 468 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 28 PID 1068 wrote to memory of 468 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 28 PID 1068 wrote to memory of 468 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 28 PID 1068 wrote to memory of 1808 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 29 PID 1068 wrote to memory of 1808 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 29 PID 1068 wrote to memory of 1808 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 29 PID 1068 wrote to memory of 1808 1068 67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe 29 PID 468 wrote to memory of 1420 468 212.exe 30 PID 468 wrote to memory of 1420 468 212.exe 30 PID 468 wrote to memory of 1420 468 212.exe 30 PID 468 wrote to memory of 1420 468 212.exe 30 PID 468 wrote to memory of 1420 468 212.exe 30 PID 468 wrote to memory of 1420 468 212.exe 30 PID 468 wrote to memory of 1420 468 212.exe 30 PID 468 wrote to memory of 1392 468 212.exe 31 PID 468 wrote to memory of 1392 468 212.exe 31 PID 468 wrote to memory of 1392 468 212.exe 31 PID 468 wrote to memory of 1392 468 212.exe 31 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33 PID 1420 wrote to memory of 1668 1420 rundll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe"C:\Users\Admin\AppData\Local\Temp\67a4340f5fba6ba61e546b8616f51dbbb9191381338f718250290a441ad31eca.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files (x86)\sedhrgc\212.exe"C:\Program Files (x86)\sedhrgc\212.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\YUXSBf\1cp0b0yZ.dll,Linsibao3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\System32\svchost.exe4⤵
- Adds Run key to start application
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Program Files (x86)\sedhrgc\212.exe"3⤵PID:1392
-
-
-
C:\Program Files (x86)\sedhrgc\213.exe"C:\Program Files (x86)\sedhrgc\213.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD528583e5b3f304e7484c379a2f8d416e0
SHA13396a4a656efe5db551657927adccba638244919
SHA256ae060066c48a9004109c53d3ff931e51628eac77c32a51402ece054c1f7878d4
SHA5128a8c4eb5392726e9bf438e99cab30c82f798e829b7407bec4632b5036bdb963392906d488d8ae0801222e2ac8d3b89d3f7e55f5b85db6e1767ff8d99af0e3391
-
Filesize
107KB
MD528583e5b3f304e7484c379a2f8d416e0
SHA13396a4a656efe5db551657927adccba638244919
SHA256ae060066c48a9004109c53d3ff931e51628eac77c32a51402ece054c1f7878d4
SHA5128a8c4eb5392726e9bf438e99cab30c82f798e829b7407bec4632b5036bdb963392906d488d8ae0801222e2ac8d3b89d3f7e55f5b85db6e1767ff8d99af0e3391
-
Filesize
94KB
MD5c01db170d9f75beaa3a41c906ef6985b
SHA13e339d7509f080e18a771f2e93854fc6504ba601
SHA256125edb1c8528fa76142250b66c43905002236209e303d99e23f1d1de43c9b2ca
SHA5120101b85a8adafa263ae251dee08daca4ec264f2dc49d2df9bfd3f33190c53a2beb46f8e53d6b98c503eb97c4bfc50a2eab768c87406aa59c6efbc191ae1eb199
-
Filesize
84KB
MD593859e111c427972c02913b57e82d977
SHA1f9ed1d9c6d773c02c5852fdedd16e5acfd1a4c6b
SHA256fb3f23523f9008f2f7aed46b3ecbee9b40dbd8e253377c907c3bdd1b8b417b6e
SHA51224d7bdf49c18d150beba3e6ee81968d8ad9d4941a2d49f8dd53ff0e31e84320fe2055227237d2d180a1ae3b8728281cc96cd32394aac199e27d0874459fc49cb
-
Filesize
107KB
MD528583e5b3f304e7484c379a2f8d416e0
SHA13396a4a656efe5db551657927adccba638244919
SHA256ae060066c48a9004109c53d3ff931e51628eac77c32a51402ece054c1f7878d4
SHA5128a8c4eb5392726e9bf438e99cab30c82f798e829b7407bec4632b5036bdb963392906d488d8ae0801222e2ac8d3b89d3f7e55f5b85db6e1767ff8d99af0e3391
-
Filesize
107KB
MD528583e5b3f304e7484c379a2f8d416e0
SHA13396a4a656efe5db551657927adccba638244919
SHA256ae060066c48a9004109c53d3ff931e51628eac77c32a51402ece054c1f7878d4
SHA5128a8c4eb5392726e9bf438e99cab30c82f798e829b7407bec4632b5036bdb963392906d488d8ae0801222e2ac8d3b89d3f7e55f5b85db6e1767ff8d99af0e3391
-
Filesize
107KB
MD528583e5b3f304e7484c379a2f8d416e0
SHA13396a4a656efe5db551657927adccba638244919
SHA256ae060066c48a9004109c53d3ff931e51628eac77c32a51402ece054c1f7878d4
SHA5128a8c4eb5392726e9bf438e99cab30c82f798e829b7407bec4632b5036bdb963392906d488d8ae0801222e2ac8d3b89d3f7e55f5b85db6e1767ff8d99af0e3391
-
Filesize
107KB
MD528583e5b3f304e7484c379a2f8d416e0
SHA13396a4a656efe5db551657927adccba638244919
SHA256ae060066c48a9004109c53d3ff931e51628eac77c32a51402ece054c1f7878d4
SHA5128a8c4eb5392726e9bf438e99cab30c82f798e829b7407bec4632b5036bdb963392906d488d8ae0801222e2ac8d3b89d3f7e55f5b85db6e1767ff8d99af0e3391
-
Filesize
94KB
MD5c01db170d9f75beaa3a41c906ef6985b
SHA13e339d7509f080e18a771f2e93854fc6504ba601
SHA256125edb1c8528fa76142250b66c43905002236209e303d99e23f1d1de43c9b2ca
SHA5120101b85a8adafa263ae251dee08daca4ec264f2dc49d2df9bfd3f33190c53a2beb46f8e53d6b98c503eb97c4bfc50a2eab768c87406aa59c6efbc191ae1eb199
-
Filesize
94KB
MD5c01db170d9f75beaa3a41c906ef6985b
SHA13e339d7509f080e18a771f2e93854fc6504ba601
SHA256125edb1c8528fa76142250b66c43905002236209e303d99e23f1d1de43c9b2ca
SHA5120101b85a8adafa263ae251dee08daca4ec264f2dc49d2df9bfd3f33190c53a2beb46f8e53d6b98c503eb97c4bfc50a2eab768c87406aa59c6efbc191ae1eb199
-
Filesize
94KB
MD5c01db170d9f75beaa3a41c906ef6985b
SHA13e339d7509f080e18a771f2e93854fc6504ba601
SHA256125edb1c8528fa76142250b66c43905002236209e303d99e23f1d1de43c9b2ca
SHA5120101b85a8adafa263ae251dee08daca4ec264f2dc49d2df9bfd3f33190c53a2beb46f8e53d6b98c503eb97c4bfc50a2eab768c87406aa59c6efbc191ae1eb199
-
Filesize
94KB
MD5c01db170d9f75beaa3a41c906ef6985b
SHA13e339d7509f080e18a771f2e93854fc6504ba601
SHA256125edb1c8528fa76142250b66c43905002236209e303d99e23f1d1de43c9b2ca
SHA5120101b85a8adafa263ae251dee08daca4ec264f2dc49d2df9bfd3f33190c53a2beb46f8e53d6b98c503eb97c4bfc50a2eab768c87406aa59c6efbc191ae1eb199
-
Filesize
84KB
MD593859e111c427972c02913b57e82d977
SHA1f9ed1d9c6d773c02c5852fdedd16e5acfd1a4c6b
SHA256fb3f23523f9008f2f7aed46b3ecbee9b40dbd8e253377c907c3bdd1b8b417b6e
SHA51224d7bdf49c18d150beba3e6ee81968d8ad9d4941a2d49f8dd53ff0e31e84320fe2055227237d2d180a1ae3b8728281cc96cd32394aac199e27d0874459fc49cb
-
Filesize
84KB
MD593859e111c427972c02913b57e82d977
SHA1f9ed1d9c6d773c02c5852fdedd16e5acfd1a4c6b
SHA256fb3f23523f9008f2f7aed46b3ecbee9b40dbd8e253377c907c3bdd1b8b417b6e
SHA51224d7bdf49c18d150beba3e6ee81968d8ad9d4941a2d49f8dd53ff0e31e84320fe2055227237d2d180a1ae3b8728281cc96cd32394aac199e27d0874459fc49cb
-
Filesize
84KB
MD593859e111c427972c02913b57e82d977
SHA1f9ed1d9c6d773c02c5852fdedd16e5acfd1a4c6b
SHA256fb3f23523f9008f2f7aed46b3ecbee9b40dbd8e253377c907c3bdd1b8b417b6e
SHA51224d7bdf49c18d150beba3e6ee81968d8ad9d4941a2d49f8dd53ff0e31e84320fe2055227237d2d180a1ae3b8728281cc96cd32394aac199e27d0874459fc49cb
-
Filesize
84KB
MD593859e111c427972c02913b57e82d977
SHA1f9ed1d9c6d773c02c5852fdedd16e5acfd1a4c6b
SHA256fb3f23523f9008f2f7aed46b3ecbee9b40dbd8e253377c907c3bdd1b8b417b6e
SHA51224d7bdf49c18d150beba3e6ee81968d8ad9d4941a2d49f8dd53ff0e31e84320fe2055227237d2d180a1ae3b8728281cc96cd32394aac199e27d0874459fc49cb