Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 18:34
Behavioral task
behavioral1
Sample
002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe
Resource
win7-20220812-en
General
-
Target
002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe
-
Size
17.9MB
-
MD5
559b9d305238419c920edfb123e4be62
-
SHA1
49182110ad23e65745ccb9687c8f664b6b40d5fa
-
SHA256
002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214
-
SHA512
b90cbdf03479be618c980e9eee852c804d5d0dd35696785d122171b02f0b9ba163ee8d6828f746cb349aab9a03e974db3717a5cb20450794ee0311ab43368c12
-
SSDEEP
393216:0YRQ5UEr2KLc6rM5cbHr8Lkqs5m4LIdgsMn2H6GgVMy5guFqmC06ag151/r/V:w5bLcCXskqD4MdU2HnsgYULzV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MiTools.exepid process 900 MiTools.exe -
Processes:
resource yara_rule behavioral1/memory/1492-55-0x0000000000400000-0x00000000004D4000-memory.dmp upx behavioral1/memory/1492-66-0x0000000000400000-0x00000000004D4000-memory.dmp upx -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\MI\MiTools.exe vmprotect C:\Users\Admin\AppData\Local\Temp\MI\MiTools.exe vmprotect \Users\Admin\AppData\Local\Temp\MI\MiTools.exe vmprotect C:\Users\Admin\AppData\Local\Temp\MI\MiTools.exe vmprotect behavioral1/memory/900-62-0x0000000000400000-0x0000000001976000-memory.dmp vmprotect behavioral1/memory/900-64-0x0000000000400000-0x0000000001976000-memory.dmp vmprotect -
Loads dropped DLL 2 IoCs
Processes:
002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exepid process 1492 002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe 1492 002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/1492-55-0x0000000000400000-0x00000000004D4000-memory.dmp autoit_exe behavioral1/memory/1492-66-0x0000000000400000-0x00000000004D4000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
MiTools.exepid process 900 MiTools.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MiTools.exepid process 900 MiTools.exe 900 MiTools.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exedescription pid process target process PID 1492 wrote to memory of 900 1492 002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe MiTools.exe PID 1492 wrote to memory of 900 1492 002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe MiTools.exe PID 1492 wrote to memory of 900 1492 002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe MiTools.exe PID 1492 wrote to memory of 900 1492 002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe MiTools.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe"C:\Users\Admin\AppData\Local\Temp\002c839bbd1aac288559ba28e59d9f6d1fc8e2a93f72383e13b7f9f2a47f4214.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MI\MiTools.exe"C:\Users\Admin\AppData\Local\Temp\MI\MiTools.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MI\MiTools.exeFilesize
11.3MB
MD5f7581ce8303fe975ca989acfad7874fd
SHA12acbec400337fbd5318999b574838d17ab33e699
SHA25661bbd194ab480439e364740cfe019666be965a18320d91d85e2d6d123e7aa63b
SHA512210d55900531f5390b4a62cc9bca12c00dab3b69056d04e433fa970df6dd14a5ab59372a72ffaf3808beb2c65b04cb2e394acbb2822359829ca985acb4472d37
-
C:\Users\Admin\AppData\Local\Temp\MI\MiTools.exeFilesize
11.3MB
MD5f7581ce8303fe975ca989acfad7874fd
SHA12acbec400337fbd5318999b574838d17ab33e699
SHA25661bbd194ab480439e364740cfe019666be965a18320d91d85e2d6d123e7aa63b
SHA512210d55900531f5390b4a62cc9bca12c00dab3b69056d04e433fa970df6dd14a5ab59372a72ffaf3808beb2c65b04cb2e394acbb2822359829ca985acb4472d37
-
\Users\Admin\AppData\Local\Temp\MI\MiTools.exeFilesize
11.3MB
MD5f7581ce8303fe975ca989acfad7874fd
SHA12acbec400337fbd5318999b574838d17ab33e699
SHA25661bbd194ab480439e364740cfe019666be965a18320d91d85e2d6d123e7aa63b
SHA512210d55900531f5390b4a62cc9bca12c00dab3b69056d04e433fa970df6dd14a5ab59372a72ffaf3808beb2c65b04cb2e394acbb2822359829ca985acb4472d37
-
\Users\Admin\AppData\Local\Temp\MI\MiTools.exeFilesize
11.3MB
MD5f7581ce8303fe975ca989acfad7874fd
SHA12acbec400337fbd5318999b574838d17ab33e699
SHA25661bbd194ab480439e364740cfe019666be965a18320d91d85e2d6d123e7aa63b
SHA512210d55900531f5390b4a62cc9bca12c00dab3b69056d04e433fa970df6dd14a5ab59372a72ffaf3808beb2c65b04cb2e394acbb2822359829ca985acb4472d37
-
memory/900-58-0x0000000000000000-mapping.dmp
-
memory/900-62-0x0000000000400000-0x0000000001976000-memory.dmpFilesize
21.5MB
-
memory/900-64-0x0000000000400000-0x0000000001976000-memory.dmpFilesize
21.5MB
-
memory/1492-54-0x0000000075921000-0x0000000075923000-memory.dmpFilesize
8KB
-
memory/1492-55-0x0000000000400000-0x00000000004D4000-memory.dmpFilesize
848KB
-
memory/1492-66-0x0000000000400000-0x00000000004D4000-memory.dmpFilesize
848KB