Analysis
-
max time kernel
104s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe
Resource
win10v2004-20221111-en
General
-
Target
0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe
-
Size
2.1MB
-
MD5
3fb3f6f3ac528a2729fcc288a3674068
-
SHA1
15d562d30ace9c69a92ad7dc8a4d45a9dd2c18c8
-
SHA256
0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2
-
SHA512
d36f54dca40d4f32ae1551fda9db10f3bde7305033c4d97a1081f896914c98deef800a50114346d83d9e59e2d8c8f2d38e5d18f36ed278ef0627a7440fa5a933
-
SSDEEP
49152:j8H6V5OX2DvztsG7pkGf9pO7psF6E3ly1JOQZja80CPeK:aC/jzt97pxFpO7psgE3lwRtac
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1752 Setup.exe 572 btengine_Setup.exe -
resource yara_rule behavioral1/files/0x00090000000122fa-64.dat upx behavioral1/files/0x00090000000122fa-65.dat upx behavioral1/files/0x00090000000122fa-67.dat upx behavioral1/files/0x00090000000122fa-69.dat upx behavioral1/files/0x00090000000122fa-71.dat upx behavioral1/files/0x00090000000122fa-70.dat upx behavioral1/memory/572-73-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Loads dropped DLL 8 IoCs
pid Process 1612 0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe 1752 Setup.exe 1752 Setup.exe 1752 Setup.exe 1752 Setup.exe 572 btengine_Setup.exe 572 btengine_Setup.exe 572 btengine_Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main btengine_Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1752 Setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 572 btengine_Setup.exe 572 btengine_Setup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1752 1612 0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe 28 PID 1612 wrote to memory of 1752 1612 0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe 28 PID 1612 wrote to memory of 1752 1612 0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe 28 PID 1612 wrote to memory of 1752 1612 0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe 28 PID 1612 wrote to memory of 1752 1612 0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe 28 PID 1612 wrote to memory of 1752 1612 0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe 28 PID 1612 wrote to memory of 1752 1612 0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe 28 PID 1752 wrote to memory of 572 1752 Setup.exe 29 PID 1752 wrote to memory of 572 1752 Setup.exe 29 PID 1752 wrote to memory of 572 1752 Setup.exe 29 PID 1752 wrote to memory of 572 1752 Setup.exe 29 PID 1752 wrote to memory of 572 1752 Setup.exe 29 PID 1752 wrote to memory of 572 1752 Setup.exe 29 PID 1752 wrote to memory of 572 1752 Setup.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe"C:\Users\Admin\AppData\Local\Temp\0e568e0d9b0ca5a16510b1f26921070446113b92b46cf6368a451ab1c8817dd2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exeC:\Users\Admin\AppData\Local\Temp\RarSFX0\btengine_Setup.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:572
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD519de4d67776c77ef4f86908cbf21d7c7
SHA1757c02d9aa75b5d843d28cac05ba817b375c4d20
SHA256b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b
SHA51246b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1
-
Filesize
735KB
MD57d840408d414e22e3c57b748a3a06783
SHA1fd73cdf210485568451315868a288a1ddd63fcf8
SHA25641e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145
SHA512d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e
-
Filesize
735KB
MD57d840408d414e22e3c57b748a3a06783
SHA1fd73cdf210485568451315868a288a1ddd63fcf8
SHA25641e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145
SHA512d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e
-
Filesize
671KB
MD519de4d67776c77ef4f86908cbf21d7c7
SHA1757c02d9aa75b5d843d28cac05ba817b375c4d20
SHA256b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b
SHA51246b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1
-
Filesize
214B
MD58c880f6ed4a1209da3a16640cdd850cc
SHA1a2cb21803945d6a479e460a0a4c5f64ffa76953c
SHA25673fd501dd52ccd9301bf59ea34c4e67ebdbda642fb620c36cd4431cd8643503d
SHA512d81ead604f31bd6a0e01432f1962faa635708b126557ab5e6e03252d7eb982175e26482e3c559953a85b014eb099097dd1a4fa6fe8052e00282a2b0d475fc9fc
-
Filesize
735KB
MD57d840408d414e22e3c57b748a3a06783
SHA1fd73cdf210485568451315868a288a1ddd63fcf8
SHA25641e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145
SHA512d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e
-
Filesize
735KB
MD57d840408d414e22e3c57b748a3a06783
SHA1fd73cdf210485568451315868a288a1ddd63fcf8
SHA25641e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145
SHA512d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e
-
Filesize
735KB
MD57d840408d414e22e3c57b748a3a06783
SHA1fd73cdf210485568451315868a288a1ddd63fcf8
SHA25641e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145
SHA512d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e
-
Filesize
735KB
MD57d840408d414e22e3c57b748a3a06783
SHA1fd73cdf210485568451315868a288a1ddd63fcf8
SHA25641e358277613d25758614b7b12c26660e43e5282974b88a4b0694c8a98013145
SHA512d90121c1acc1eea6e354962ed33562514279e221e5ec6f2890cd1dc07982256b0a00da1bf39f8cb688e39a91afccd8f36035f59e62d30a40ea934f40226ef57e
-
Filesize
671KB
MD519de4d67776c77ef4f86908cbf21d7c7
SHA1757c02d9aa75b5d843d28cac05ba817b375c4d20
SHA256b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b
SHA51246b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1
-
Filesize
671KB
MD519de4d67776c77ef4f86908cbf21d7c7
SHA1757c02d9aa75b5d843d28cac05ba817b375c4d20
SHA256b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b
SHA51246b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1
-
Filesize
671KB
MD519de4d67776c77ef4f86908cbf21d7c7
SHA1757c02d9aa75b5d843d28cac05ba817b375c4d20
SHA256b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b
SHA51246b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1
-
Filesize
671KB
MD519de4d67776c77ef4f86908cbf21d7c7
SHA1757c02d9aa75b5d843d28cac05ba817b375c4d20
SHA256b7028e72aae01418da32fcfc511fdb3acd1721a4a6cf95a0ba7cc72cbee8265b
SHA51246b3814a826beb8b645d660f4e22fce2ba68b757b11b9f2e886683bee852d80034d066cea8f1cda1d505f37b3d46eeeee4e3fa1e169167942be85d40e39efea1