Analysis
-
max time kernel
230s -
max time network
314s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 04:33
Static task
static1
Behavioral task
behavioral1
Sample
5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe
Resource
win10v2004-20221111-en
General
-
Target
5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe
-
Size
96KB
-
MD5
8c990f3189ed94e92a88fcf4131974aa
-
SHA1
c45ea00192197809060202c742c15f0bcb705527
-
SHA256
5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15
-
SHA512
998cbc0ff127b586390439034eba1cd6e6bf377fef8040d91d24906efaf5ced16f17e51801d2730b4151eae1f9fe205afbb5fc01c8ad4f399b56299c3c96e42c
-
SSDEEP
1536:ZuqNAOCxiH8SWttzZQeCLSQ3pRX7ZlojgWYevDCvbSgBvUICk9:8qfCxjSsFQeVQZRX7ZlEgWqmwvUIh9
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\M-1-52-5782-8752-5245\winsvc.exe = "C:\\Users\\Admin\\M-1-52-5782-8752-5245\\winsvc.exe:*:Enabled:Microsoft® Windows Update" 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe -
Executes dropped EXE 2 IoCs
pid Process 1108 winsvc.exe 608 winsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 784 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 784 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows Update = "C:\\Users\\Admin\\M-1-52-5782-8752-5245\\winsvc.exe" 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 520 set thread context of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 1108 set thread context of 608 1108 winsvc.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 520 wrote to memory of 784 520 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 28 PID 784 wrote to memory of 1108 784 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 29 PID 784 wrote to memory of 1108 784 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 29 PID 784 wrote to memory of 1108 784 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 29 PID 784 wrote to memory of 1108 784 5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe 29 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30 PID 1108 wrote to memory of 608 1108 winsvc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe"C:\Users\Admin\AppData\Local\Temp\5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe"C:\Users\Admin\AppData\Local\Temp\5fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\M-1-52-5782-8752-5245\winsvc.exe"C:\Users\Admin\M-1-52-5782-8752-5245\winsvc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\M-1-52-5782-8752-5245\winsvc.exe"C:\Users\Admin\M-1-52-5782-8752-5245\winsvc.exe"4⤵
- Executes dropped EXE
PID:608
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58c990f3189ed94e92a88fcf4131974aa
SHA1c45ea00192197809060202c742c15f0bcb705527
SHA2565fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15
SHA512998cbc0ff127b586390439034eba1cd6e6bf377fef8040d91d24906efaf5ced16f17e51801d2730b4151eae1f9fe205afbb5fc01c8ad4f399b56299c3c96e42c
-
Filesize
96KB
MD58c990f3189ed94e92a88fcf4131974aa
SHA1c45ea00192197809060202c742c15f0bcb705527
SHA2565fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15
SHA512998cbc0ff127b586390439034eba1cd6e6bf377fef8040d91d24906efaf5ced16f17e51801d2730b4151eae1f9fe205afbb5fc01c8ad4f399b56299c3c96e42c
-
Filesize
96KB
MD58c990f3189ed94e92a88fcf4131974aa
SHA1c45ea00192197809060202c742c15f0bcb705527
SHA2565fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15
SHA512998cbc0ff127b586390439034eba1cd6e6bf377fef8040d91d24906efaf5ced16f17e51801d2730b4151eae1f9fe205afbb5fc01c8ad4f399b56299c3c96e42c
-
Filesize
96KB
MD58c990f3189ed94e92a88fcf4131974aa
SHA1c45ea00192197809060202c742c15f0bcb705527
SHA2565fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15
SHA512998cbc0ff127b586390439034eba1cd6e6bf377fef8040d91d24906efaf5ced16f17e51801d2730b4151eae1f9fe205afbb5fc01c8ad4f399b56299c3c96e42c
-
Filesize
96KB
MD58c990f3189ed94e92a88fcf4131974aa
SHA1c45ea00192197809060202c742c15f0bcb705527
SHA2565fff5bebd8ce790410cac14557e79ad760957e67d0c01767ffd90e7abcf3fb15
SHA512998cbc0ff127b586390439034eba1cd6e6bf377fef8040d91d24906efaf5ced16f17e51801d2730b4151eae1f9fe205afbb5fc01c8ad4f399b56299c3c96e42c