Analysis
-
max time kernel
151s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe
Resource
win10v2004-20220812-en
General
-
Target
bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe
-
Size
126KB
-
MD5
c53c07a60b70dc13d833d18432b97750
-
SHA1
b222ed4eb66f41a70e5c2a18b37c611ae4975883
-
SHA256
bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
-
SHA512
b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8
-
SSDEEP
3072:bz1tx+SuJin7ClTa4aLYa6KQfxzqZ5l5sXN8F2P1PHjrRh:bzrduYnWwH6KQfxUlKQyP/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 696 lsass.exe 1052 lsass.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mtKRzHJklN.lnk bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mtKRzHJklN.lnk lsass.exe -
Loads dropped DLL 4 IoCs
pid Process 1676 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 1676 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 696 lsass.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 904 set thread context of 1676 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 28 PID 696 set thread context of 1052 696 lsass.exe 30 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new lsass.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1208 Process not Found 1208 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1052 lsass.exe 1728 explorer.exe 1208 Process not Found 1208 Process not Found 1208 Process not Found 1208 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1676 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe Token: SeDebugPrivilege 1052 lsass.exe Token: SeDebugPrivilege 1208 Process not Found -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 904 wrote to memory of 1676 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 28 PID 904 wrote to memory of 1676 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 28 PID 904 wrote to memory of 1676 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 28 PID 904 wrote to memory of 1676 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 28 PID 904 wrote to memory of 1676 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 28 PID 904 wrote to memory of 1676 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 28 PID 904 wrote to memory of 1676 904 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 28 PID 1676 wrote to memory of 696 1676 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 29 PID 1676 wrote to memory of 696 1676 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 29 PID 1676 wrote to memory of 696 1676 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 29 PID 1676 wrote to memory of 696 1676 bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe 29 PID 696 wrote to memory of 1052 696 lsass.exe 30 PID 696 wrote to memory of 1052 696 lsass.exe 30 PID 696 wrote to memory of 1052 696 lsass.exe 30 PID 696 wrote to memory of 1052 696 lsass.exe 30 PID 696 wrote to memory of 1052 696 lsass.exe 30 PID 696 wrote to memory of 1052 696 lsass.exe 30 PID 696 wrote to memory of 1052 696 lsass.exe 30 PID 1052 wrote to memory of 1728 1052 lsass.exe 31 PID 1052 wrote to memory of 1728 1052 lsass.exe 31 PID 1052 wrote to memory of 1728 1052 lsass.exe 31 PID 1052 wrote to memory of 1728 1052 lsass.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe"C:\Users\Admin\AppData\Local\Temp\bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe"C:\Users\Admin\AppData\Local\Temp\bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\explorer.exeC:\Windows\explorer.exe5⤵
- Suspicious behavior: MapViewOfSection
PID:1728
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5c53c07a60b70dc13d833d18432b97750
SHA1b222ed4eb66f41a70e5c2a18b37c611ae4975883
SHA256bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
SHA512b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8
-
Filesize
126KB
MD5c53c07a60b70dc13d833d18432b97750
SHA1b222ed4eb66f41a70e5c2a18b37c611ae4975883
SHA256bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
SHA512b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8
-
Filesize
126KB
MD5c53c07a60b70dc13d833d18432b97750
SHA1b222ed4eb66f41a70e5c2a18b37c611ae4975883
SHA256bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
SHA512b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8
-
Filesize
126KB
MD5c53c07a60b70dc13d833d18432b97750
SHA1b222ed4eb66f41a70e5c2a18b37c611ae4975883
SHA256bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
SHA512b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8
-
Filesize
940B
MD55991bb2a36db4122ef5c22f670287b16
SHA1a4c0c53bda43463a1d59b9dce4bbf5b49abe3c81
SHA25671c86f226841a66124d633eb3c21aa0b26d60b7c3e6023e2eaa0570537856671
SHA5127ec90daeef171b6d71bcbafed96eb15effd0c54675bee391b8cc670868e350033d99d8be6f5b0dbb5d10df7003fff6cb9f26c4beec7ed3bf2a30af7cd987b98b
-
Filesize
514B
MD55d3bd53f63d25ce546a4db8d46ee9dba
SHA167ccd5f22134e7376b0701e7bb0f3c33ead03d82
SHA256309b8602ac2df95ae422567098d466f5c7a17078172ccfaccc1550135d031490
SHA5127937c48f84da1300db2abdcb9ebbf64551a7f73fd0328ea20268a3e2b961c9f7369367ea849ad1a4635f432326ac9be11f65c882122e20cc27056a94c68da1d6
-
Filesize
126KB
MD5c53c07a60b70dc13d833d18432b97750
SHA1b222ed4eb66f41a70e5c2a18b37c611ae4975883
SHA256bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
SHA512b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8
-
Filesize
126KB
MD5c53c07a60b70dc13d833d18432b97750
SHA1b222ed4eb66f41a70e5c2a18b37c611ae4975883
SHA256bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
SHA512b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8
-
Filesize
126KB
MD5c53c07a60b70dc13d833d18432b97750
SHA1b222ed4eb66f41a70e5c2a18b37c611ae4975883
SHA256bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
SHA512b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8
-
Filesize
126KB
MD5c53c07a60b70dc13d833d18432b97750
SHA1b222ed4eb66f41a70e5c2a18b37c611ae4975883
SHA256bf7720a475a3691c80baca7463a94433f06971d5e3c834557bbe94f665d4d09e
SHA512b8a753d41a0e26ae866b78cbd8a6b663672953bba84ce089f88db50c19dd8f9e388b5e4f53efae1eedcdb4dee401bf4e352a7520cd3f793e018d2791c70cabd8