Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 06:09
Static task
static1
Behavioral task
behavioral1
Sample
0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe
Resource
win10v2004-20220812-en
General
-
Target
0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe
-
Size
839KB
-
MD5
749998443724d711cdd14a1ff876e1b0
-
SHA1
abfd5f60b7b21bc7e91a3bce18311975668de15d
-
SHA256
0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773
-
SHA512
14938288b400955b077ddc245793c938180115616a09697b5717f35403e8b651371417127218b891064171165819b85dea9bb9ad9367173af7ba12ea054a9f6e
-
SSDEEP
24576:H5jrebjLkeYEZQH/YzSk7rLcsprNKDcOTRY39dZGd:ZjIXk3oYYGe3h8de37
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1732 tdefender.exe -
Loads dropped DLL 2 IoCs
pid Process 1896 0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe 1896 0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run tdefender.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\tdefender.exe" tdefender.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: tdefender.exe File opened (read-only) \??\T: tdefender.exe File opened (read-only) \??\U: tdefender.exe File opened (read-only) \??\V: tdefender.exe File opened (read-only) \??\R: tdefender.exe File opened (read-only) \??\S: tdefender.exe File opened (read-only) \??\X: tdefender.exe File opened (read-only) \??\Z: tdefender.exe File opened (read-only) \??\E: tdefender.exe File opened (read-only) \??\G: tdefender.exe File opened (read-only) \??\I: tdefender.exe File opened (read-only) \??\J: tdefender.exe File opened (read-only) \??\P: tdefender.exe File opened (read-only) \??\W: tdefender.exe File opened (read-only) \??\F: tdefender.exe File opened (read-only) \??\H: tdefender.exe File opened (read-only) \??\L: tdefender.exe File opened (read-only) \??\O: tdefender.exe File opened (read-only) \??\K: tdefender.exe File opened (read-only) \??\N: tdefender.exe File opened (read-only) \??\Q: tdefender.exe File opened (read-only) \??\Y: tdefender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 tdefender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1896 0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1896 0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe 1732 tdefender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1732 tdefender.exe 1732 tdefender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1732 1896 0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe 28 PID 1896 wrote to memory of 1732 1896 0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe 28 PID 1896 wrote to memory of 1732 1896 0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe 28 PID 1896 wrote to memory of 1732 1896 0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe"C:\Users\Admin\AppData\Local\Temp\0c6ffb37c7c636cefbbfd62474708fcdeab87a4d7d8cf225e2273efe7c8ae773.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\ProgramData\tdefender.exeC:\ProgramData\tdefender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD5605aa7e787f3c05d097279bbdaccc255
SHA1e93219847a26dafdf78ba74220d4d708d879a7df
SHA2560761cb760ecc363fe101695b6f01d89a8fd0affb286063c7e9ad8c38dab7629d
SHA51277af1a6b4f7f117677875cc920ac184033bf70ce3dd15ce3807637ebc78223fab7c2a73101b9a9ace8bd1376f2716e310b12428e4168e2f41818dd5e952a1c2a
-
Filesize
829KB
MD5605aa7e787f3c05d097279bbdaccc255
SHA1e93219847a26dafdf78ba74220d4d708d879a7df
SHA2560761cb760ecc363fe101695b6f01d89a8fd0affb286063c7e9ad8c38dab7629d
SHA51277af1a6b4f7f117677875cc920ac184033bf70ce3dd15ce3807637ebc78223fab7c2a73101b9a9ace8bd1376f2716e310b12428e4168e2f41818dd5e952a1c2a
-
Filesize
829KB
MD5605aa7e787f3c05d097279bbdaccc255
SHA1e93219847a26dafdf78ba74220d4d708d879a7df
SHA2560761cb760ecc363fe101695b6f01d89a8fd0affb286063c7e9ad8c38dab7629d
SHA51277af1a6b4f7f117677875cc920ac184033bf70ce3dd15ce3807637ebc78223fab7c2a73101b9a9ace8bd1376f2716e310b12428e4168e2f41818dd5e952a1c2a