Analysis
-
max time kernel
191s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 03:13
Static task
static1
Behavioral task
behavioral1
Sample
7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
Resource
win10v2004-20220812-en
General
-
Target
7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe
-
Size
152KB
-
MD5
f432a89d4ba2e6aa2975335f3a57da1b
-
SHA1
815689ebd707d7e55fd35815958db05c923b590c
-
SHA256
7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a
-
SHA512
c7dba55980d6a3ee5871ec9a50227f7e92e8f2bd4a74d25d15ae76f0110f437ac215fe3ec25921b6f2b0167ca044d5a35835477756c2dae86344b32844a81905
-
SSDEEP
3072:yIl0QiGEomaClFmwbcDRMjEBZ4v9xDx71yHVJA/ndH5:uJG2rv3cGBvHV7Wknd
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 364 regedit.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2008 wrote to memory of 900 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 28 PID 2008 wrote to memory of 900 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 28 PID 2008 wrote to memory of 900 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 28 PID 2008 wrote to memory of 900 2008 7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe 28 PID 900 wrote to memory of 364 900 regedt32.exe 29 PID 900 wrote to memory of 364 900 regedt32.exe 29 PID 900 wrote to memory of 364 900 regedt32.exe 29 PID 900 wrote to memory of 364 900 regedt32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe"C:\Users\Admin\AppData\Local\Temp\7460e8ac554d05f22f812d9bcbcf82bc55f64e0823f7b1f5f0063bc297c2b17a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\regedt32.exe"C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"3⤵
- Runs .reg file with regedit
PID:364
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD584254df6df9b919aa7236aebea5b4132
SHA114071ad10ecb853c3f29118317f710b2b0aced9b
SHA25661b29858d488a0e74f75875ebef1c21159771a10e52f268f443132b919cfe593
SHA51219e08e611ea968f040019d698f984cbb9c17e6eb83d80930a8f95dde0fd0d6217ac04f96bc4e265dc316289359ef47f01fce0ad69ca3dff535c540e6094175ee
-
Filesize
41KB
MD53fd996d73950eeb6edfa0a2f6589fd89
SHA13c998a95ff61cf2054c0b155d2a09cf7002d1779
SHA25618a1e581a1a28d82bf0a28d85428fde674cbac0ebe0df9e77dd16f3db540fbfb
SHA5129e8f3b2fa5645825df71ac746a6ff8746e1b062ca97719a0eecec0249149e2bbe8142f76684739040d3657d9f713a21b5a6ec62c77aa9d4d709cf637cb8e5fd1