Analysis
-
max time kernel
148s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
36858bb18574315047429775c5bdca18.exe
Resource
win7-20221111-en
General
-
Target
36858bb18574315047429775c5bdca18.exe
-
Size
1.0MB
-
MD5
36858bb18574315047429775c5bdca18
-
SHA1
ebb242dcb189f0501f2631324af21eca9b7094a1
-
SHA256
5eab382b9338d93188634d7f10e192a9fe644753910f4a65c483ba76d440f133
-
SHA512
9d12738740fe779850a64c3e987eec32e105d7d464d9bdabe2fb124417d2fdbc955eb841b8161efdccb7fb1c66d58b1a56feca50699990499a6e77d12a0f4e8d
-
SSDEEP
12288:aSZIKqGtTfNuvWUYVoMkta4rHAnaNNZit1MU2adY+IcL1Nz0M4J7jl9Qg:acIEfNNUYVoMq1gaNnI4aV1yM4JrJ
Malware Config
Extracted
formbook
pgnt
0WG18LbM4lR9iqMRa4nlBzTb
jcfGYzPgZTqFZVO9FV2yIw==
laIfrdSC8/4CNg==
Q73ilev5GIWuOrAAFV2yIw==
Q2u/pMw7pv4sPA==
TbqvIUHwlQscPo0HFV2yIw==
8PNWfGPyE8n0IQ==
WtgROxXzvY2L
PryaRBNjm4eP
Y9Hdi06Cry1um9Sj68YAu1o=
3Gulyp7CMQtR78jvLkk=
JJ3GasTVTCRQT6Tfz6S6GlI=
RnS42bhb9tI0R6UpD6wOxriNxw==
he1mi2sOGfzTRGHnuA==
eaYjCtjxVjdU5XLRtBMBLKk9quA=
k9rTeEqYzzw8WaTfz6S6GlI=
5luVQwe2vJWKEAiMdF4=
MGW14L9OVk5Y5TaR6w/DqdhYxXVY
mAsYz6k6sQkDC0/DoHj9t1RPWLSgFQ==
y5klhuMbE8n0IQ==
u/NKcEKARatNn/dT
ZJaHJQCvzDWRuPPmMsEVxriNxw==
nRhddlcPOegWrv5R
/njA0TJ1U+osPA==
pi8az6AySKlNn/dT
e/k+YjN+U+osPA==
kMAZ36lMWa3gRGHnuA==
wfX0nGsGE1yUJb1Jq33LoDdDWLSgFQ==
wfk35UJcfeHoRGHnuA==
dbzljekZ3ka2QYCYOP1I
Nq3kDeMNNJWDMnWYOP1I
Sa0SN/04cNje8xbaJLgUxriNxw==
yDejyZiQ/X/BQYiYOP1I
UIPN7ckznp2W
s/HtqJNKdmtv88jvLkk=
KanG2bhM0CsdiNrNF0E=
QLrtp3svzjcsTaJ9y5kPopyQzQ==
syhbC2iJZ8obK2Y7nHSa7CmdUuA=
HZXK676zo5OV
5WFoCWeuxqekcHx5YkE=
PbX1H/gmE8n0IQ==
3HTB6Asznp2W
9HGhWLLyrJXPcq4FRecyGU247XBS
/oW437jofmJ8DQiMdF4=
sh415lJ8q3cL3XJvaEA=
XucfBGWzVEg=
PKWeQgpB1cUHprue4sYAu1o=
MXFzDmuO/nBtmjc6g5elIVMbQeWFjyMN
q+v2lgI9Vb0rC2juug==
WYvkDdX8kEjU73U=
6BJjmWGiizGT
fLHageH29Ex1m8jvLkk=
3D+hsVkFtIyr5WI=
ntIbRgolp0jU73U=
GGGJMpC3pJPdQ8ZGkpxA
8FtjHvNDiICP
L63yFOor5uMdLqnrNNblBzTb
Gav/MgU4AByfuddW
xek7Tm3lhlY=
n2sDng5BBdtNn/dT
LZsINfoQH6dNn/dT
Io+SQh7ak0Ti7Gg=
T8Xci1oCP63aRGHnuA==
bZX0DnWMqxcyQ39hzOH+7U0BvmhP
hf9blwwuwpx7j8k.live
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
36858bb18574315047429775c5bdca18.exedescription pid process target process PID 836 set thread context of 1656 836 36858bb18574315047429775c5bdca18.exe 36858bb18574315047429775c5bdca18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
36858bb18574315047429775c5bdca18.exepowershell.exepid process 1656 36858bb18574315047429775c5bdca18.exe 812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 812 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
36858bb18574315047429775c5bdca18.exedescription pid process target process PID 836 wrote to memory of 812 836 36858bb18574315047429775c5bdca18.exe powershell.exe PID 836 wrote to memory of 812 836 36858bb18574315047429775c5bdca18.exe powershell.exe PID 836 wrote to memory of 812 836 36858bb18574315047429775c5bdca18.exe powershell.exe PID 836 wrote to memory of 812 836 36858bb18574315047429775c5bdca18.exe powershell.exe PID 836 wrote to memory of 752 836 36858bb18574315047429775c5bdca18.exe schtasks.exe PID 836 wrote to memory of 752 836 36858bb18574315047429775c5bdca18.exe schtasks.exe PID 836 wrote to memory of 752 836 36858bb18574315047429775c5bdca18.exe schtasks.exe PID 836 wrote to memory of 752 836 36858bb18574315047429775c5bdca18.exe schtasks.exe PID 836 wrote to memory of 1656 836 36858bb18574315047429775c5bdca18.exe 36858bb18574315047429775c5bdca18.exe PID 836 wrote to memory of 1656 836 36858bb18574315047429775c5bdca18.exe 36858bb18574315047429775c5bdca18.exe PID 836 wrote to memory of 1656 836 36858bb18574315047429775c5bdca18.exe 36858bb18574315047429775c5bdca18.exe PID 836 wrote to memory of 1656 836 36858bb18574315047429775c5bdca18.exe 36858bb18574315047429775c5bdca18.exe PID 836 wrote to memory of 1656 836 36858bb18574315047429775c5bdca18.exe 36858bb18574315047429775c5bdca18.exe PID 836 wrote to memory of 1656 836 36858bb18574315047429775c5bdca18.exe 36858bb18574315047429775c5bdca18.exe PID 836 wrote to memory of 1656 836 36858bb18574315047429775c5bdca18.exe 36858bb18574315047429775c5bdca18.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36858bb18574315047429775c5bdca18.exe"C:\Users\Admin\AppData\Local\Temp\36858bb18574315047429775c5bdca18.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HRlyZTYWzC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRlyZTYWzC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDDA3.tmp"2⤵
- Creates scheduled task(s)
PID:752 -
C:\Users\Admin\AppData\Local\Temp\36858bb18574315047429775c5bdca18.exe"C:\Users\Admin\AppData\Local\Temp\36858bb18574315047429775c5bdca18.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpDDA3.tmpFilesize
1KB
MD5799adcb877306e8d8ac4dcbd0acde614
SHA1864154c8419cd8f6c8dcf413f7ff6b52d718c2d4
SHA256df91eafafe32e8b0e79247443ad248d4442cf53ddc245cabb1eaa60a96dca536
SHA512078577e1a82ca91737bd8103cf954ceafd5a90f844cce1328b02306ff8e776bdf9bd8d2b6429bbc28a0a12e0f65ce360b9336065b91105d442d3da6b080c66b5
-
memory/752-60-0x0000000000000000-mapping.dmp
-
memory/812-59-0x0000000000000000-mapping.dmp
-
memory/812-74-0x000000006F140000-0x000000006F6EB000-memory.dmpFilesize
5.7MB
-
memory/812-73-0x000000006F140000-0x000000006F6EB000-memory.dmpFilesize
5.7MB
-
memory/836-63-0x00000000011D0000-0x0000000001240000-memory.dmpFilesize
448KB
-
memory/836-58-0x0000000005E20000-0x0000000005ECA000-memory.dmpFilesize
680KB
-
memory/836-57-0x0000000000530000-0x000000000053C000-memory.dmpFilesize
48KB
-
memory/836-54-0x0000000001240000-0x0000000001348000-memory.dmpFilesize
1.0MB
-
memory/836-56-0x0000000000490000-0x00000000004A8000-memory.dmpFilesize
96KB
-
memory/836-55-0x00000000759F1000-0x00000000759F3000-memory.dmpFilesize
8KB
-
memory/1656-64-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1656-65-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1656-67-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1656-68-0x00000000004012B0-mapping.dmp
-
memory/1656-70-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/1656-71-0x0000000000401000-0x000000000042F000-memory.dmpFilesize
184KB
-
memory/1656-72-0x0000000000970000-0x0000000000C73000-memory.dmpFilesize
3.0MB