Analysis
-
max time kernel
151s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe
Resource
win10v2004-20220812-en
General
-
Target
5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe
-
Size
847KB
-
MD5
030a85605dcbad5ab2e76197a51773b0
-
SHA1
14412b08f4ed847c1c442e682e9990f1e9fa2398
-
SHA256
5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d
-
SHA512
55982fb73085432b1712a3fafd9f946b8bfebce23cad8a2745425f00576ae476fff0025a38d682fe9cf3f2ca3f129859717af62c895304e82b7a8694ac1e2f51
-
SSDEEP
12288:DcCyEQR8/FIZxdV841GoqE6bxl9a/OXvcd7ERtEUqvgdX59RW3lC3TE3NhBClkII:3yX3ZxdV39+oEckdqvcX53WEEX0KII
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 944 bsprotection.exe -
Loads dropped DLL 2 IoCs
pid Process 1132 5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe 1132 5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run bsprotection.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\bsprotection.exe" bsprotection.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: bsprotection.exe File opened (read-only) \??\X: bsprotection.exe File opened (read-only) \??\Y: bsprotection.exe File opened (read-only) \??\E: bsprotection.exe File opened (read-only) \??\K: bsprotection.exe File opened (read-only) \??\M: bsprotection.exe File opened (read-only) \??\N: bsprotection.exe File opened (read-only) \??\R: bsprotection.exe File opened (read-only) \??\Z: bsprotection.exe File opened (read-only) \??\I: bsprotection.exe File opened (read-only) \??\G: bsprotection.exe File opened (read-only) \??\O: bsprotection.exe File opened (read-only) \??\S: bsprotection.exe File opened (read-only) \??\T: bsprotection.exe File opened (read-only) \??\U: bsprotection.exe File opened (read-only) \??\W: bsprotection.exe File opened (read-only) \??\F: bsprotection.exe File opened (read-only) \??\J: bsprotection.exe File opened (read-only) \??\L: bsprotection.exe File opened (read-only) \??\P: bsprotection.exe File opened (read-only) \??\V: bsprotection.exe File opened (read-only) \??\H: bsprotection.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 bsprotection.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1132 5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe 944 bsprotection.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 944 bsprotection.exe 944 bsprotection.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 944 1132 5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe 28 PID 1132 wrote to memory of 944 1132 5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe 28 PID 1132 wrote to memory of 944 1132 5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe 28 PID 1132 wrote to memory of 944 1132 5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe"C:\Users\Admin\AppData\Local\Temp\5bdaab99b9bc24a292a315cc2f70fcd8a5836f5d76748704887369e140657e7d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\ProgramData\bsprotection.exeC:\ProgramData\bsprotection.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830KB
MD5fd2099f35981e860093d4cd0083ed207
SHA144721929f82ba7152f1415ee3f8a48cdafea0dd3
SHA256bb4cc1678a75d94996ed17612bbf01be52de797588259d66f37087dfc42a5acc
SHA5120979d795d864306e8d772a3e4e5f122394cb7ca441cd14dbe8f9c9a5b30cbf641817d1339ecaa10cba54b3a5347883d42af061e61204fc3dbedd950465e54c17
-
Filesize
830KB
MD5fd2099f35981e860093d4cd0083ed207
SHA144721929f82ba7152f1415ee3f8a48cdafea0dd3
SHA256bb4cc1678a75d94996ed17612bbf01be52de797588259d66f37087dfc42a5acc
SHA5120979d795d864306e8d772a3e4e5f122394cb7ca441cd14dbe8f9c9a5b30cbf641817d1339ecaa10cba54b3a5347883d42af061e61204fc3dbedd950465e54c17
-
Filesize
830KB
MD5fd2099f35981e860093d4cd0083ed207
SHA144721929f82ba7152f1415ee3f8a48cdafea0dd3
SHA256bb4cc1678a75d94996ed17612bbf01be52de797588259d66f37087dfc42a5acc
SHA5120979d795d864306e8d772a3e4e5f122394cb7ca441cd14dbe8f9c9a5b30cbf641817d1339ecaa10cba54b3a5347883d42af061e61204fc3dbedd950465e54c17