Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe
Resource
win10v2004-20220812-en
General
-
Target
744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe
-
Size
1.3MB
-
MD5
c9e071b18ca0aea0a89ebf0943f80e53
-
SHA1
8a22d1362983177821f3e2cdf8eed980777a72f9
-
SHA256
744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b
-
SHA512
bfd6f017ae605110bbd3dcd18516cc82a241bb0a146282d82b472c6ca25e897a04f93bf85fd6eb940e0aeabcc3fdb1e34eb61311829ca61bc52351f873c7f016
-
SSDEEP
24576:mbwlgdC2aus8fZHu/B6S+xWNU73Za15QQS6UEbk73HYLA:mD8cS0uqJj0bk73HYLA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1560 smse.exe -
Deletes itself 1 IoCs
pid Process 980 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe 1560 smse.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1560 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe 27 PID 1480 wrote to memory of 1560 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe 27 PID 1480 wrote to memory of 1560 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe 27 PID 1480 wrote to memory of 1560 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe 27 PID 1480 wrote to memory of 980 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe 28 PID 1480 wrote to memory of 980 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe 28 PID 1480 wrote to memory of 980 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe 28 PID 1480 wrote to memory of 980 1480 744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe"C:\Users\Admin\AppData\Local\Temp\744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\tmp0E.39\smse.exe"C:\Users\Admin\AppData\Local\Temp\tmp0E.39\smse.exe" smse tmp0E.392⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$Windows$$.bat2⤵
- Deletes itself
PID:980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD5e5f888b7423a79cdde9c730f7502a600
SHA19d51f9d7dfd90f6ccd3d84f35df66c4f19da9b79
SHA2564f8307870959feca4361424b3883e02e45d8da7b21aeb2ee4e472709bf071f68
SHA5126d04c565f69d1f3521a88f524bd40078a3d1c7424092802b8e70f6a397fa1ebc3046606518fbd745e7ad9bd916c0ee6166b0c571508347c23c6bd1a06e61acb6
-
Filesize
1.3MB
MD5c9e071b18ca0aea0a89ebf0943f80e53
SHA18a22d1362983177821f3e2cdf8eed980777a72f9
SHA256744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b
SHA512bfd6f017ae605110bbd3dcd18516cc82a241bb0a146282d82b472c6ca25e897a04f93bf85fd6eb940e0aeabcc3fdb1e34eb61311829ca61bc52351f873c7f016
-
Filesize
1.3MB
MD5c9e071b18ca0aea0a89ebf0943f80e53
SHA18a22d1362983177821f3e2cdf8eed980777a72f9
SHA256744575435e68e8b5fe951d951dfed37a24b4e97601c4ec84a9fe3d0e63882d9b
SHA512bfd6f017ae605110bbd3dcd18516cc82a241bb0a146282d82b472c6ca25e897a04f93bf85fd6eb940e0aeabcc3fdb1e34eb61311829ca61bc52351f873c7f016