Analysis
-
max time kernel
20s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe
Resource
win10v2004-20221111-en
General
-
Target
88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe
-
Size
65KB
-
MD5
439ebf43621ac57c15196af10ee92771
-
SHA1
4744db94337c4b3e5148fcda661e57958e3ead10
-
SHA256
88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07
-
SHA512
b166a0120b80f6dbce32dbe1de3727aea5e3c4d239fe17c974404780d5726f4c005130bb7f2d49c0cd1eefa553fcdabb6851e1a349871948ae8cd4546e349336
-
SSDEEP
768:0KWhDgt0qdIz6xZbsU2uAWY4eI4nSUuFC9Tz30M1aGoYPhJ:Z0kRxZ9AWupHkM1Xo4hJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 776 win.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1924 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45cd603ee23d7c7a771df421f5721e99.exe win.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\45cd603ee23d7c7a771df421f5721e99.exe win.exe -
Loads dropped DLL 1 IoCs
pid Process 1780 88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\45cd603ee23d7c7a771df421f5721e99 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\win.exe\" .." win.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\45cd603ee23d7c7a771df421f5721e99 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\win.exe\" .." win.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 776 win.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 win.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1780 wrote to memory of 776 1780 88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe 28 PID 1780 wrote to memory of 776 1780 88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe 28 PID 1780 wrote to memory of 776 1780 88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe 28 PID 1780 wrote to memory of 776 1780 88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe 28 PID 776 wrote to memory of 1924 776 win.exe 29 PID 776 wrote to memory of 1924 776 win.exe 29 PID 776 wrote to memory of 1924 776 win.exe 29 PID 776 wrote to memory of 1924 776 win.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe"C:\Users\Admin\AppData\Local\Temp\88ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\win.exe"C:\Users\Admin\AppData\Local\Temp\win.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\win.exe" "win.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5439ebf43621ac57c15196af10ee92771
SHA14744db94337c4b3e5148fcda661e57958e3ead10
SHA25688ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07
SHA512b166a0120b80f6dbce32dbe1de3727aea5e3c4d239fe17c974404780d5726f4c005130bb7f2d49c0cd1eefa553fcdabb6851e1a349871948ae8cd4546e349336
-
Filesize
65KB
MD5439ebf43621ac57c15196af10ee92771
SHA14744db94337c4b3e5148fcda661e57958e3ead10
SHA25688ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07
SHA512b166a0120b80f6dbce32dbe1de3727aea5e3c4d239fe17c974404780d5726f4c005130bb7f2d49c0cd1eefa553fcdabb6851e1a349871948ae8cd4546e349336
-
Filesize
65KB
MD5439ebf43621ac57c15196af10ee92771
SHA14744db94337c4b3e5148fcda661e57958e3ead10
SHA25688ddb1d958fe9132a17c215228afd4bae4530bbbd28bddbab01fd1f26f985f07
SHA512b166a0120b80f6dbce32dbe1de3727aea5e3c4d239fe17c974404780d5726f4c005130bb7f2d49c0cd1eefa553fcdabb6851e1a349871948ae8cd4546e349336