Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe
Resource
win10v2004-20221111-en
General
-
Target
de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe
-
Size
3.3MB
-
MD5
cb72239bbf7126d7dac1976c5550b002
-
SHA1
d96c559fe89d24c9379bc3a4ea25599c2232e3e3
-
SHA256
de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364
-
SHA512
7b0de9a266d4c1ef5ab79f818a030a5cd0da1c738a60a149a2726158ec21d8549df845896fdc6419f5325649cb1083ba9b6602719d437e2897cc10f7696fd844
-
SSDEEP
49152:d9Eqr58vFf+4jWMC50tCP36RktzuuTT+pwsdPd5XDv1TDIkXSWa6KPkwgmPm4GtR:MquvK1GtCPRhTT+xdPdlr1/nU9kwRLEj
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1600 de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe 1600 de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe 1600 de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 520 AUDIODG.EXE Token: 33 520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 520 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1600 de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe 1600 de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe"C:\Users\Admin\AppData\Local\Temp\de4320fd23607c176cb3e9fa1852f35653bf8cf4192c654961ab2e72a8362364.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1600
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5e12f05661436f2974cf91b5fc76fb5f4
SHA15e0b7887950204713bef3da0018911279f2540ec
SHA2561873de723938193f9f0877b08c160884b79503b6607598158ad99bd909189fdc
SHA51261d42e055865dd98552b29dd69dc3d761bc7f77c1af108ad13b0b390059be5668657645258c0c08052a5fe1e9f6bdb018da136eb103b7335097487ec0de5d22d
-
Filesize
236KB
MD5e12f05661436f2974cf91b5fc76fb5f4
SHA15e0b7887950204713bef3da0018911279f2540ec
SHA2561873de723938193f9f0877b08c160884b79503b6607598158ad99bd909189fdc
SHA51261d42e055865dd98552b29dd69dc3d761bc7f77c1af108ad13b0b390059be5668657645258c0c08052a5fe1e9f6bdb018da136eb103b7335097487ec0de5d22d
-
Filesize
236KB
MD5e12f05661436f2974cf91b5fc76fb5f4
SHA15e0b7887950204713bef3da0018911279f2540ec
SHA2561873de723938193f9f0877b08c160884b79503b6607598158ad99bd909189fdc
SHA51261d42e055865dd98552b29dd69dc3d761bc7f77c1af108ad13b0b390059be5668657645258c0c08052a5fe1e9f6bdb018da136eb103b7335097487ec0de5d22d