Analysis
-
max time kernel
197s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe
Resource
win10v2004-20221111-en
General
-
Target
e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe
-
Size
64KB
-
MD5
2780374d6b9ddb0574cf76c7e6f2fd10
-
SHA1
d3594e0791ac64acf102a8f9a2f6e839701de3ab
-
SHA256
e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c
-
SHA512
83bc3ff52dd182e094247519c6744ccb7da9348553c6c0f5e625c48891cf255652bada3ef29cbaf8b07f5e0b060455d720f2f4e1ecbeebf4d0edd22c17a9c382
-
SSDEEP
1536:W2iaAUsY9KlxwaqTHB9vwlGiDOdxe2AqrC:WqZKl2pfwlgdyqrC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 IntelSupport.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1168 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\415c03e977101a5881cc8108b71223e5.exe IntelSupport.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\415c03e977101a5881cc8108b71223e5.exe IntelSupport.exe -
Loads dropped DLL 2 IoCs
pid Process 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\415c03e977101a5881cc8108b71223e5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IntelSupport.exe\" .." IntelSupport.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\415c03e977101a5881cc8108b71223e5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\IntelSupport.exe\" .." IntelSupport.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe 1932 IntelSupport.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe Token: SeDebugPrivilege 1932 IntelSupport.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1932 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 28 PID 1324 wrote to memory of 1932 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 28 PID 1324 wrote to memory of 1932 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 28 PID 1324 wrote to memory of 1932 1324 e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe 28 PID 1932 wrote to memory of 1168 1932 IntelSupport.exe 29 PID 1932 wrote to memory of 1168 1932 IntelSupport.exe 29 PID 1932 wrote to memory of 1168 1932 IntelSupport.exe 29 PID 1932 wrote to memory of 1168 1932 IntelSupport.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe"C:\Users\Admin\AppData\Local\Temp\e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IntelSupport.exe"C:\Users\Admin\AppData\Local\Temp\IntelSupport.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\IntelSupport.exe" "IntelSupport.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52780374d6b9ddb0574cf76c7e6f2fd10
SHA1d3594e0791ac64acf102a8f9a2f6e839701de3ab
SHA256e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c
SHA51283bc3ff52dd182e094247519c6744ccb7da9348553c6c0f5e625c48891cf255652bada3ef29cbaf8b07f5e0b060455d720f2f4e1ecbeebf4d0edd22c17a9c382
-
Filesize
64KB
MD52780374d6b9ddb0574cf76c7e6f2fd10
SHA1d3594e0791ac64acf102a8f9a2f6e839701de3ab
SHA256e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c
SHA51283bc3ff52dd182e094247519c6744ccb7da9348553c6c0f5e625c48891cf255652bada3ef29cbaf8b07f5e0b060455d720f2f4e1ecbeebf4d0edd22c17a9c382
-
Filesize
64KB
MD52780374d6b9ddb0574cf76c7e6f2fd10
SHA1d3594e0791ac64acf102a8f9a2f6e839701de3ab
SHA256e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c
SHA51283bc3ff52dd182e094247519c6744ccb7da9348553c6c0f5e625c48891cf255652bada3ef29cbaf8b07f5e0b060455d720f2f4e1ecbeebf4d0edd22c17a9c382
-
Filesize
64KB
MD52780374d6b9ddb0574cf76c7e6f2fd10
SHA1d3594e0791ac64acf102a8f9a2f6e839701de3ab
SHA256e28c5297d0b141d2243aabce8d09c415da2b2f15a85215c6317b67ba7cfb8b0c
SHA51283bc3ff52dd182e094247519c6744ccb7da9348553c6c0f5e625c48891cf255652bada3ef29cbaf8b07f5e0b060455d720f2f4e1ecbeebf4d0edd22c17a9c382