Analysis
-
max time kernel
247s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 07:54
Static task
static1
Behavioral task
behavioral1
Sample
92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe
Resource
win10v2004-20220901-en
General
-
Target
92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe
-
Size
670KB
-
MD5
815e86b824f259f0fee44c04b156f477
-
SHA1
a7bc276d0302f67a902a7b592352c2dc63a2116c
-
SHA256
92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624
-
SHA512
0b686d65042fed388751b926d8ece15271afb44b93d5e7e62abcc5a1a5991bab26b24ad780f10c326e4bd12d1b09589db80be15f12abef7d00fc311fb0c6e899
-
SSDEEP
12288:WzFGgI2b5QqOr3xZlxvvkPYj+rQlxQvmBZ4/wu6o5m6:W5hTOr3xZDUP/jeBZ4Yu1
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\log.txt 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 6 IoCs
pid Process 948 taskkill.exe 1784 taskkill.exe 1532 taskkill.exe 1952 taskkill.exe 1352 taskkill.exe 1588 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 948 taskkill.exe Token: SeDebugPrivilege 1784 taskkill.exe Token: SeDebugPrivilege 1532 taskkill.exe Token: SeDebugPrivilege 1352 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 1588 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1260 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 28 PID 1492 wrote to memory of 1260 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 28 PID 1492 wrote to memory of 1260 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 28 PID 1492 wrote to memory of 1260 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 28 PID 1260 wrote to memory of 948 1260 cmd.exe 30 PID 1260 wrote to memory of 948 1260 cmd.exe 30 PID 1260 wrote to memory of 948 1260 cmd.exe 30 PID 1260 wrote to memory of 948 1260 cmd.exe 30 PID 1492 wrote to memory of 1792 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 31 PID 1492 wrote to memory of 1792 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 31 PID 1492 wrote to memory of 1792 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 31 PID 1492 wrote to memory of 1792 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 31 PID 1792 wrote to memory of 1784 1792 cmd.exe 33 PID 1792 wrote to memory of 1784 1792 cmd.exe 33 PID 1792 wrote to memory of 1784 1792 cmd.exe 33 PID 1792 wrote to memory of 1784 1792 cmd.exe 33 PID 1492 wrote to memory of 884 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 34 PID 1492 wrote to memory of 884 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 34 PID 1492 wrote to memory of 884 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 34 PID 1492 wrote to memory of 884 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 34 PID 884 wrote to memory of 1532 884 cmd.exe 36 PID 884 wrote to memory of 1532 884 cmd.exe 36 PID 884 wrote to memory of 1532 884 cmd.exe 36 PID 884 wrote to memory of 1532 884 cmd.exe 36 PID 1492 wrote to memory of 1572 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 38 PID 1492 wrote to memory of 1572 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 38 PID 1492 wrote to memory of 1572 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 38 PID 1492 wrote to memory of 1572 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 38 PID 1572 wrote to memory of 1952 1572 cmd.exe 40 PID 1572 wrote to memory of 1952 1572 cmd.exe 40 PID 1572 wrote to memory of 1952 1572 cmd.exe 40 PID 1572 wrote to memory of 1952 1572 cmd.exe 40 PID 1492 wrote to memory of 2044 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 41 PID 1492 wrote to memory of 2044 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 41 PID 1492 wrote to memory of 2044 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 41 PID 1492 wrote to memory of 2044 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 41 PID 2044 wrote to memory of 1352 2044 cmd.exe 43 PID 2044 wrote to memory of 1352 2044 cmd.exe 43 PID 2044 wrote to memory of 1352 2044 cmd.exe 43 PID 2044 wrote to memory of 1352 2044 cmd.exe 43 PID 1492 wrote to memory of 1824 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 44 PID 1492 wrote to memory of 1824 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 44 PID 1492 wrote to memory of 1824 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 44 PID 1492 wrote to memory of 1824 1492 92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe 44 PID 1824 wrote to memory of 1588 1824 cmd.exe 46 PID 1824 wrote to memory of 1588 1824 cmd.exe 46 PID 1824 wrote to memory of 1588 1824 cmd.exe 46 PID 1824 wrote to memory of 1588 1824 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe"C:\Users\Admin\AppData\Local\Temp\92a1b21b1ab0c846c50a2cc6e97b93bb70e1e3c9e9b1b43e5d27cca21baf3624.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill/f /im 360SE.exe /T2⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360SE.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill/f /im IEXPLORE.exe /T2⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im IEXPLORE.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill/f /im iexplore.exe /T2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im iexplore.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill/f /im iexplore.exe /T2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im iexplore.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill/f /im Aliimsafe.exe /T2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Aliimsafe.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill/f /im AliIm.exe /T2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AliIm.exe /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-