Analysis
-
max time kernel
156s -
max time network
196s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe
Resource
win10v2004-20221111-en
General
-
Target
573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe
-
Size
272KB
-
MD5
72b50893859c54ab44784c588a1bd8aa
-
SHA1
4b08267dfb6decaac1188362fcd43af9b4eee6c7
-
SHA256
573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f
-
SHA512
5af3ad3737e705cc28c6d52fe3fa7829ddbba0e06a1ff1b1e8bce23fb41d0705fc97ae7354d412619e56dee8340b9f7c23a088362398d7479e155ea1157b8787
-
SSDEEP
3072:Mx20vlI9JI5sBfsPwj1/9+VXKgOj8sSmrm3NaBiS5KltLspxrCO+rpTdZxuGQup:OG849+VXKgOjLMNaBiSkltLy5p+r5Au
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1632 explorer.exe 576 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 1908 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\explorer.exe" explorer.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\U: explorer.exe File opened (read-only) \??\W: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\N: explorer.exe File opened (read-only) \??\O: explorer.exe File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\V: explorer.exe File opened (read-only) \??\Y: explorer.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\Z: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\K: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\Q: explorer.exe File opened (read-only) \??\R: explorer.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\P: explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1772 set thread context of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1632 set thread context of 576 1632 explorer.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 1632 explorer.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1772 wrote to memory of 1908 1772 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 28 PID 1908 wrote to memory of 1632 1908 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 29 PID 1908 wrote to memory of 1632 1908 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 29 PID 1908 wrote to memory of 1632 1908 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 29 PID 1908 wrote to memory of 1632 1908 573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe 29 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30 PID 1632 wrote to memory of 576 1632 explorer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe"C:\Users\Admin\AppData\Local\Temp\573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe"C:\Users\Admin\AppData\Local\Temp\573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
PID:576
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD572b50893859c54ab44784c588a1bd8aa
SHA14b08267dfb6decaac1188362fcd43af9b4eee6c7
SHA256573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f
SHA5125af3ad3737e705cc28c6d52fe3fa7829ddbba0e06a1ff1b1e8bce23fb41d0705fc97ae7354d412619e56dee8340b9f7c23a088362398d7479e155ea1157b8787
-
Filesize
272KB
MD572b50893859c54ab44784c588a1bd8aa
SHA14b08267dfb6decaac1188362fcd43af9b4eee6c7
SHA256573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f
SHA5125af3ad3737e705cc28c6d52fe3fa7829ddbba0e06a1ff1b1e8bce23fb41d0705fc97ae7354d412619e56dee8340b9f7c23a088362398d7479e155ea1157b8787
-
Filesize
272KB
MD572b50893859c54ab44784c588a1bd8aa
SHA14b08267dfb6decaac1188362fcd43af9b4eee6c7
SHA256573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f
SHA5125af3ad3737e705cc28c6d52fe3fa7829ddbba0e06a1ff1b1e8bce23fb41d0705fc97ae7354d412619e56dee8340b9f7c23a088362398d7479e155ea1157b8787
-
Filesize
272KB
MD572b50893859c54ab44784c588a1bd8aa
SHA14b08267dfb6decaac1188362fcd43af9b4eee6c7
SHA256573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f
SHA5125af3ad3737e705cc28c6d52fe3fa7829ddbba0e06a1ff1b1e8bce23fb41d0705fc97ae7354d412619e56dee8340b9f7c23a088362398d7479e155ea1157b8787
-
Filesize
272KB
MD572b50893859c54ab44784c588a1bd8aa
SHA14b08267dfb6decaac1188362fcd43af9b4eee6c7
SHA256573a6764daf6d5a68c60b0ed549659b4504d858f111589c92d75ffd5420ef18f
SHA5125af3ad3737e705cc28c6d52fe3fa7829ddbba0e06a1ff1b1e8bce23fb41d0705fc97ae7354d412619e56dee8340b9f7c23a088362398d7479e155ea1157b8787