Analysis
-
max time kernel
205s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe
Resource
win10v2004-20221111-en
General
-
Target
7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe
-
Size
113KB
-
MD5
b3537a685e23afc74e0c1a826a05b9f0
-
SHA1
f1d3b51c72286c355f0a9c593534acfe967e37e7
-
SHA256
7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4
-
SHA512
b5460cff3779ffb7e137656f61849c989e80f3be8a09ce4ff15dc4cb6a625df22489063a7681d7b171e4a7848b6d8e15dad35e72a3dbd6337d77739945e573c8
-
SSDEEP
1536:4vX0Fsao+upmcDuZMrlXmKhpUgGZ0IDbl40SdgjcP:l29RX5UHZ0I9oe6
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe = "C:\\Users\\Admin\\P-7-78-8964-9648-3874\\wincrs.exe:*:Enabled:Microsoft Windows System" 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe -
Executes dropped EXE 2 IoCs
pid Process 1496 wincrs.exe 1872 wincrs.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 1968 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows System = "C:\\Users\\Admin\\P-7-78-8964-9648-3874\\wincrs.exe" 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2008 set thread context of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 1496 set thread context of 1872 1496 wincrs.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 2008 wrote to memory of 1968 2008 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 27 PID 1968 wrote to memory of 1496 1968 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 28 PID 1968 wrote to memory of 1496 1968 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 28 PID 1968 wrote to memory of 1496 1968 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 28 PID 1968 wrote to memory of 1496 1968 7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe 28 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29 PID 1496 wrote to memory of 1872 1496 wincrs.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe"C:\Users\Admin\AppData\Local\Temp\7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe"C:\Users\Admin\AppData\Local\Temp\7b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe"C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe"C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe"4⤵
- Executes dropped EXE
PID:1872
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5b3537a685e23afc74e0c1a826a05b9f0
SHA1f1d3b51c72286c355f0a9c593534acfe967e37e7
SHA2567b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4
SHA512b5460cff3779ffb7e137656f61849c989e80f3be8a09ce4ff15dc4cb6a625df22489063a7681d7b171e4a7848b6d8e15dad35e72a3dbd6337d77739945e573c8
-
Filesize
113KB
MD5b3537a685e23afc74e0c1a826a05b9f0
SHA1f1d3b51c72286c355f0a9c593534acfe967e37e7
SHA2567b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4
SHA512b5460cff3779ffb7e137656f61849c989e80f3be8a09ce4ff15dc4cb6a625df22489063a7681d7b171e4a7848b6d8e15dad35e72a3dbd6337d77739945e573c8
-
Filesize
113KB
MD5b3537a685e23afc74e0c1a826a05b9f0
SHA1f1d3b51c72286c355f0a9c593534acfe967e37e7
SHA2567b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4
SHA512b5460cff3779ffb7e137656f61849c989e80f3be8a09ce4ff15dc4cb6a625df22489063a7681d7b171e4a7848b6d8e15dad35e72a3dbd6337d77739945e573c8
-
Filesize
113KB
MD5b3537a685e23afc74e0c1a826a05b9f0
SHA1f1d3b51c72286c355f0a9c593534acfe967e37e7
SHA2567b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4
SHA512b5460cff3779ffb7e137656f61849c989e80f3be8a09ce4ff15dc4cb6a625df22489063a7681d7b171e4a7848b6d8e15dad35e72a3dbd6337d77739945e573c8
-
Filesize
113KB
MD5b3537a685e23afc74e0c1a826a05b9f0
SHA1f1d3b51c72286c355f0a9c593534acfe967e37e7
SHA2567b3f5c89f5f93a9ae82efe1d046ffd7766b51f4607e6b577de6a738e6b80ade4
SHA512b5460cff3779ffb7e137656f61849c989e80f3be8a09ce4ff15dc4cb6a625df22489063a7681d7b171e4a7848b6d8e15dad35e72a3dbd6337d77739945e573c8