Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 03:41
Behavioral task
behavioral1
Sample
b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe
Resource
win10v2004-20221111-en
General
-
Target
b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe
-
Size
44KB
-
MD5
3fb68181f7a494cc8e37ecd6a0cf693b
-
SHA1
4481093b4bb8170b7c1009251801cb5dca11dc64
-
SHA256
b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942
-
SHA512
3448fea8ac5c6373c268cfe63a1ff8a33ed3d2f222bbe65f734319beca6b8956da6f24a6292944227ee847b908840c9e8077f6f5ffe1487a117ec96dd88ce995
-
SSDEEP
768:IGt7C9Vm3xIfy/Gh6gqbsMcwa77wtMF0knYukA5zNNXCIwlgyymPyHmIjNDq:IGCVm3GpXA5cHwtMF0CYu357XxjvNm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1676 System64.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7880F99D-BC3G-14DF-89AS-1190DR808E85} b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7880F99D-BC3G-14DF-89AS-1190DR808E85}\StubPath = "C:\\Windows\\system32\\System64.exe" b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe -
resource yara_rule behavioral1/files/0x000b0000000122ef-55.dat upx behavioral1/files/0x000b0000000122ef-57.dat upx behavioral1/memory/948-58-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/files/0x000b0000000122ef-60.dat upx behavioral1/memory/380-67-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/380-65-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/380-62-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral1/memory/1676-70-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 948 b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\System64.exe b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe File opened for modification C:\Windows\SysWOW64\System64.exe b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1676 set thread context of 380 1676 System64.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1676 System64.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 948 wrote to memory of 1676 948 b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe 28 PID 948 wrote to memory of 1676 948 b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe 28 PID 948 wrote to memory of 1676 948 b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe 28 PID 948 wrote to memory of 1676 948 b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe 28 PID 1676 wrote to memory of 380 1676 System64.exe 29 PID 1676 wrote to memory of 380 1676 System64.exe 29 PID 1676 wrote to memory of 380 1676 System64.exe 29 PID 1676 wrote to memory of 380 1676 System64.exe 29 PID 1676 wrote to memory of 380 1676 System64.exe 29 PID 1676 wrote to memory of 380 1676 System64.exe 29 PID 1676 wrote to memory of 380 1676 System64.exe 29 PID 1676 wrote to memory of 380 1676 System64.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe"C:\Users\Admin\AppData\Local\Temp\b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\System64.exe"C:\Windows\system32\System64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\userinit.exe"C:\Windows\system32\userinit.exe"3⤵PID:380
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD53fb68181f7a494cc8e37ecd6a0cf693b
SHA14481093b4bb8170b7c1009251801cb5dca11dc64
SHA256b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942
SHA5123448fea8ac5c6373c268cfe63a1ff8a33ed3d2f222bbe65f734319beca6b8956da6f24a6292944227ee847b908840c9e8077f6f5ffe1487a117ec96dd88ce995
-
Filesize
44KB
MD53fb68181f7a494cc8e37ecd6a0cf693b
SHA14481093b4bb8170b7c1009251801cb5dca11dc64
SHA256b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942
SHA5123448fea8ac5c6373c268cfe63a1ff8a33ed3d2f222bbe65f734319beca6b8956da6f24a6292944227ee847b908840c9e8077f6f5ffe1487a117ec96dd88ce995
-
Filesize
44KB
MD53fb68181f7a494cc8e37ecd6a0cf693b
SHA14481093b4bb8170b7c1009251801cb5dca11dc64
SHA256b0a4879f2cdbddb7189095b821d55062818ee5a185533788dee0814307f9f942
SHA5123448fea8ac5c6373c268cfe63a1ff8a33ed3d2f222bbe65f734319beca6b8956da6f24a6292944227ee847b908840c9e8077f6f5ffe1487a117ec96dd88ce995