Analysis
-
max time kernel
178s -
max time network
260s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 00:48
Static task
static1
Behavioral task
behavioral1
Sample
ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe
Resource
win10v2004-20220812-en
General
-
Target
ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe
-
Size
193KB
-
MD5
81893f62cfc3a6d923bc64897f4475a1
-
SHA1
83163c7d4f746f809dab7f4ff7c3019c4b32520a
-
SHA256
ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac
-
SHA512
dd7f06ece14cf231da28a50516e105419a055f7c2f1783589a5c0f2fe87fa996a812ae03aade89976a64148cf93145396f39a29f93fb0a5d4c277827e1f931ea
-
SSDEEP
3072:lX7DItrfaocyTgfsqQOlJqyCM+d81eVr6h+37qHxsde+OeSyqJ1n0C:lsaocyLCqLRdUGrW+LqHkq10C
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1508 installer.exe 1704 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe -
Loads dropped DLL 3 IoCs
pid Process 568 ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe 568 ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe 568 ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81 installer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1704 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe 1704 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 568 wrote to memory of 1508 568 ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe 28 PID 568 wrote to memory of 1508 568 ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe 28 PID 568 wrote to memory of 1508 568 ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe 28 PID 568 wrote to memory of 1508 568 ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe 28 PID 1508 wrote to memory of 1704 1508 installer.exe 30 PID 1508 wrote to memory of 1704 1508 installer.exe 30 PID 1508 wrote to memory of 1704 1508 installer.exe 30 PID 1508 wrote to memory of 1704 1508 installer.exe 30 PID 1508 wrote to memory of 1704 1508 installer.exe 30 PID 1508 wrote to memory of 1704 1508 installer.exe 30 PID 1508 wrote to memory of 1704 1508 installer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe"C:\Users\Admin\AppData\Local\Temp\ad93eec2111db1674fb6fcfa84bdffd9996a11d67581e8e9ff75fabfffde4fac.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\installer.exeC:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\installer.exe 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe /dT131381424S /e6030842 /t /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe"C:\Users\Admin\AppData\Local\Temp\nsj786D.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe" /dT131381424S /e6030842 /t /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30
Filesize1KB
MD57339ea35afc5fa0a61af3b9515365bfd
SHA1347ca8ac22f1f5f4b631e04fe8381f1d45df570a
SHA25681d049b342ae2f1d188bd7bbd227eab7b39415f234d231c653158ffa1f0be60d
SHA512fe7216159a026deef2eb9dd2185c2373828bc49fade836d5d37494e6aed70960b9c88e40e6d427a4a04f07576390092883c70c16c4385971ae81a0b9ffdbfb39
-
Filesize
604B
MD5e7ed9b0571e14a4824cebee137d9bcd1
SHA159d9a27a741aee4bfc0605a287a88782cdafe6ff
SHA25662f9b298a1f9e62f29c486f9cd2731a28302b9215656fd8b1c7c0071071b25ad
SHA5126f6f379a5fbce3afbfb29b159bfe784ecf4b42672c5bc441e89383c54ccd210766388526748c48f9889cfdd5e126054a8d67971d69c46f37bb117e515ad9d400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30
Filesize412B
MD5c1297aafa3a7ac89bf6ad5d34d71c38f
SHA1a9b56875c101cddd9c892ba6d92db63c1ba7a6a2
SHA256913eecc2df4fb9e78796964227dc97df5ed26c9fcee0a6917baa2d35b8425720
SHA512a8a860da86905b3ed795d616cc401e1df6e884ff3600dd1a82a11f581ba0188fb618c1a686ae5a4c7828f7f2d80ad41efd8e9d46d5f9d38c8b83317c43d75ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B
Filesize188B
MD5decee8f1864fc4ce1f113f4904e78876
SHA16c0a0868c36b9face37791ae7a4c05edc1d88254
SHA256fe986b665b7d4d2b27b19b16adff8c64f0f1c7cb4c2009fe6066172883f3761a
SHA5129248991f180670c51f984693a9bae8f57db9ca5f55eadf2237f786042655dad697161d1c973263854d3e95cc62838b3658905b8be0a3b1ff4dd4df7b92fce2e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3b96046165aa8dc089a862ae003ee32
SHA187a0135f7136bc722f001c021688f7a5d224bf5b
SHA2561db54fc4f98806089be8ffa76d7a12672c8812fffe80e87a8204bea414586238
SHA512ec815c81d5732dec3f9f392d5d12652facf754b333d4954fc0887b8720159afbe1ddff104aa5fb2ebcbefac4c8af1182e0309d407bc7cb203c6a19a37a18dded
-
Filesize
151KB
MD517fcf5c9b33b94d76600fff3e4a230aa
SHA19279d85e8a737cf8187696b7190384997c437408
SHA2560e0a783e665b5f2aa7a732100b4a8024ee787c552bc89111eb933638a5d37c59
SHA5121502d7c84cc5a1eaa46dcd271b05bdc064663044291ce195ce87df0265261cfcf4dbf4f9779ae1e9b9d5fb4e04313b4b6644c1cbe0f8dcd523a52479e6d0bbe7
-
Filesize
151KB
MD517fcf5c9b33b94d76600fff3e4a230aa
SHA19279d85e8a737cf8187696b7190384997c437408
SHA2560e0a783e665b5f2aa7a732100b4a8024ee787c552bc89111eb933638a5d37c59
SHA5121502d7c84cc5a1eaa46dcd271b05bdc064663044291ce195ce87df0265261cfcf4dbf4f9779ae1e9b9d5fb4e04313b4b6644c1cbe0f8dcd523a52479e6d0bbe7
-
Filesize
139KB
MD50b8564345ce0ff65f6e22f10b8bbc2be
SHA1badecaf253c1e9e6db0327fa4ea0237446e51cf7
SHA256de113de702b145bf9ac16ec8db83e779d631093f13867cbfe42f05411be5b353
SHA512028e839be6085444066db576edb2eb4e8b0e5e70971fb54e60a2c62ad34427244765f4099f0b4134fd2c477a7e3eede2d08b465a6ee7d203377d7cff546ee02f
-
Filesize
139KB
MD50b8564345ce0ff65f6e22f10b8bbc2be
SHA1badecaf253c1e9e6db0327fa4ea0237446e51cf7
SHA256de113de702b145bf9ac16ec8db83e779d631093f13867cbfe42f05411be5b353
SHA512028e839be6085444066db576edb2eb4e8b0e5e70971fb54e60a2c62ad34427244765f4099f0b4134fd2c477a7e3eede2d08b465a6ee7d203377d7cff546ee02f
-
Filesize
139KB
MD50b8564345ce0ff65f6e22f10b8bbc2be
SHA1badecaf253c1e9e6db0327fa4ea0237446e51cf7
SHA256de113de702b145bf9ac16ec8db83e779d631093f13867cbfe42f05411be5b353
SHA512028e839be6085444066db576edb2eb4e8b0e5e70971fb54e60a2c62ad34427244765f4099f0b4134fd2c477a7e3eede2d08b465a6ee7d203377d7cff546ee02f
-
Filesize
139KB
MD50b8564345ce0ff65f6e22f10b8bbc2be
SHA1badecaf253c1e9e6db0327fa4ea0237446e51cf7
SHA256de113de702b145bf9ac16ec8db83e779d631093f13867cbfe42f05411be5b353
SHA512028e839be6085444066db576edb2eb4e8b0e5e70971fb54e60a2c62ad34427244765f4099f0b4134fd2c477a7e3eede2d08b465a6ee7d203377d7cff546ee02f
-
Filesize
8KB
MD5249ae678f0dac4c625c6de6aca53823a
SHA16ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201
SHA2567298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce
SHA51266e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7