Analysis
-
max time kernel
150s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe
Resource
win10v2004-20221111-en
General
-
Target
4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe
-
Size
62KB
-
MD5
493cc7577e6b8275cacbd0da1ae159a0
-
SHA1
209835db07410017d31b6f1620c44cf672235349
-
SHA256
4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571
-
SHA512
c65b3272ad0bc5d3e531289801a14ce95213c88ea58a627bf53656a0756d962a9274d366310a175d81d1bb51b0dfc3e76c1be603b605419a2449a4155ac55c0d
-
SSDEEP
768:hwn3wd0Hs4vlHFPMDZs32B9OOPD4Se6OGtC5sytGbEgNdw/LNPQ//ZBogA8qGG:hQ/vvPM9KE9TD8xtGXNaxQZi58qGG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 336 mx.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 572 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f45459d44f388411ade6e60a34f4b5e0.exe mx.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f45459d44f388411ade6e60a34f4b5e0.exe mx.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\f45459d44f388411ade6e60a34f4b5e0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\mx.exe\" .." mx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f45459d44f388411ade6e60a34f4b5e0 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\mx.exe\" .." mx.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1368 4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe 336 mx.exe 336 mx.exe 336 mx.exe 336 mx.exe 336 mx.exe 336 mx.exe 336 mx.exe 336 mx.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1368 4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe Token: SeDebugPrivilege 336 mx.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1368 wrote to memory of 336 1368 4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe 28 PID 1368 wrote to memory of 336 1368 4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe 28 PID 1368 wrote to memory of 336 1368 4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe 28 PID 336 wrote to memory of 572 336 mx.exe 29 PID 336 wrote to memory of 572 336 mx.exe 29 PID 336 wrote to memory of 572 336 mx.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe"C:\Users\Admin\AppData\Local\Temp\4307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\mx.exe"C:\Users\Admin\AppData\Local\Temp\mx.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\system32\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\mx.exe" "mx.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:572
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5493cc7577e6b8275cacbd0da1ae159a0
SHA1209835db07410017d31b6f1620c44cf672235349
SHA2564307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571
SHA512c65b3272ad0bc5d3e531289801a14ce95213c88ea58a627bf53656a0756d962a9274d366310a175d81d1bb51b0dfc3e76c1be603b605419a2449a4155ac55c0d
-
Filesize
62KB
MD5493cc7577e6b8275cacbd0da1ae159a0
SHA1209835db07410017d31b6f1620c44cf672235349
SHA2564307d7fc22fd761ec73acd6659e75ed33026c94e6363febc628b1daa6c0ab571
SHA512c65b3272ad0bc5d3e531289801a14ce95213c88ea58a627bf53656a0756d962a9274d366310a175d81d1bb51b0dfc3e76c1be603b605419a2449a4155ac55c0d