Analysis
-
max time kernel
157s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe
Resource
win10v2004-20220901-en
General
-
Target
8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe
-
Size
59KB
-
MD5
da39d0908322c2e582d4fcc63002c940
-
SHA1
3f64a433aae5630101975c8d414ee4f74f53008e
-
SHA256
8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9
-
SHA512
29a0d3ffe9af8b067fde2c0eda624956285ff249ac8f1fa8bb47c2a0dd71f75a01a35f6a94aacb3e46abf24803e884ebbfe231b886dcc215c0f382d483a6de27
-
SSDEEP
1536:tguQpIlkl7l8lAWJe7o/Ic72fTb9Sqn8/zf:tgdil08DeI27b3Of
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 556 dllhost32.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllwin = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dllhost32.exe" dllhost32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1932 8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe 556 dllhost32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1932 8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe Token: SeDebugPrivilege 556 dllhost32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 556 dllhost32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 556 1932 8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe 27 PID 1932 wrote to memory of 556 1932 8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe 27 PID 1932 wrote to memory of 556 1932 8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe 27 PID 1932 wrote to memory of 556 1932 8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe"C:\Users\Admin\AppData\Local\Temp\8f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\dllhost32.exe"C:\Users\Admin\AppData\Local\Temp\dllhost32.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5da39d0908322c2e582d4fcc63002c940
SHA13f64a433aae5630101975c8d414ee4f74f53008e
SHA2568f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9
SHA51229a0d3ffe9af8b067fde2c0eda624956285ff249ac8f1fa8bb47c2a0dd71f75a01a35f6a94aacb3e46abf24803e884ebbfe231b886dcc215c0f382d483a6de27
-
Filesize
59KB
MD5da39d0908322c2e582d4fcc63002c940
SHA13f64a433aae5630101975c8d414ee4f74f53008e
SHA2568f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9
SHA51229a0d3ffe9af8b067fde2c0eda624956285ff249ac8f1fa8bb47c2a0dd71f75a01a35f6a94aacb3e46abf24803e884ebbfe231b886dcc215c0f382d483a6de27
-
Filesize
59KB
MD5da39d0908322c2e582d4fcc63002c940
SHA13f64a433aae5630101975c8d414ee4f74f53008e
SHA2568f71a9ad0317f4b7bb671ee235cef359dd31c5f42d038fcb5761414cd7f6bda9
SHA51229a0d3ffe9af8b067fde2c0eda624956285ff249ac8f1fa8bb47c2a0dd71f75a01a35f6a94aacb3e46abf24803e884ebbfe231b886dcc215c0f382d483a6de27