Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 14:22
Static task
static1
Behavioral task
behavioral1
Sample
88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe
Resource
win10v2004-20221111-en
General
-
Target
88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe
-
Size
978KB
-
MD5
c784cfcf898645b2018a12ca0c67c93f
-
SHA1
97a30f8375560c79828106b619ceda10855e8ee7
-
SHA256
88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f
-
SHA512
807436dce777b67fa11706b1f5bd7852b452f11d57de456750de0ddea36567b497ee5441e8d2dc7db0d456d2a9878c89c8e69f45fd03635de5336e6713e7ec4e
-
SSDEEP
24576:TI4ttoac2KUJrWdIEdBY1G6FhPgrd7hUjYazvcVXxCp:TI4LoOJrUfNj6zI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 42063722.exe -
Deletes itself 1 IoCs
pid Process 1000 cmd.exe -
Loads dropped DLL 5 IoCs
pid Process 1744 cmd.exe 1744 cmd.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\42063722 = "C:\\ProgramData\\42063722\\42063722.exe" 88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 42063722.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\42063722 = "C:\\PROGRA~3\\42063722\\42063722.exe" 42063722.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2028 42063722.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe 2028 42063722.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 864 wrote to memory of 1000 864 88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe 28 PID 864 wrote to memory of 1000 864 88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe 28 PID 864 wrote to memory of 1000 864 88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe 28 PID 864 wrote to memory of 1000 864 88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe 28 PID 1000 wrote to memory of 1744 1000 cmd.exe 30 PID 1000 wrote to memory of 1744 1000 cmd.exe 30 PID 1000 wrote to memory of 1744 1000 cmd.exe 30 PID 1000 wrote to memory of 1744 1000 cmd.exe 30 PID 1744 wrote to memory of 2028 1744 cmd.exe 31 PID 1744 wrote to memory of 2028 1744 cmd.exe 31 PID 1744 wrote to memory of 2028 1744 cmd.exe 31 PID 1744 wrote to memory of 2028 1744 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe"C:\Users\Admin\AppData\Local\Temp\88526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\42063722\42063722.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\42063722\42063722.exe /i3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\PROGRA~3\42063722\42063722.exeC:\PROGRA~3\42063722\42063722.exe /i4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2028
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
978KB
MD5c784cfcf898645b2018a12ca0c67c93f
SHA197a30f8375560c79828106b619ceda10855e8ee7
SHA25688526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f
SHA512807436dce777b67fa11706b1f5bd7852b452f11d57de456750de0ddea36567b497ee5441e8d2dc7db0d456d2a9878c89c8e69f45fd03635de5336e6713e7ec4e
-
Filesize
978KB
MD5c784cfcf898645b2018a12ca0c67c93f
SHA197a30f8375560c79828106b619ceda10855e8ee7
SHA25688526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f
SHA512807436dce777b67fa11706b1f5bd7852b452f11d57de456750de0ddea36567b497ee5441e8d2dc7db0d456d2a9878c89c8e69f45fd03635de5336e6713e7ec4e
-
Filesize
230B
MD5417a60c60d8b7327621c39c9b5637b72
SHA17928480738bca42ed43bdfb731cfc71bb1cc2382
SHA25660dd0e71fe414a4a15c2feceb229aae2d12a17c627fc4c5347add812bd4d9476
SHA5125f3d298bb0956d6361662a12479930fb02bce848f1f48c03eae6138e17bc9a87a5b910ba974af5510fd82d2b14885086548f87c45fe5de9a2de97cc1d0eacad3
-
Filesize
978KB
MD5c784cfcf898645b2018a12ca0c67c93f
SHA197a30f8375560c79828106b619ceda10855e8ee7
SHA25688526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f
SHA512807436dce777b67fa11706b1f5bd7852b452f11d57de456750de0ddea36567b497ee5441e8d2dc7db0d456d2a9878c89c8e69f45fd03635de5336e6713e7ec4e
-
Filesize
978KB
MD5c784cfcf898645b2018a12ca0c67c93f
SHA197a30f8375560c79828106b619ceda10855e8ee7
SHA25688526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f
SHA512807436dce777b67fa11706b1f5bd7852b452f11d57de456750de0ddea36567b497ee5441e8d2dc7db0d456d2a9878c89c8e69f45fd03635de5336e6713e7ec4e
-
Filesize
978KB
MD5c784cfcf898645b2018a12ca0c67c93f
SHA197a30f8375560c79828106b619ceda10855e8ee7
SHA25688526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f
SHA512807436dce777b67fa11706b1f5bd7852b452f11d57de456750de0ddea36567b497ee5441e8d2dc7db0d456d2a9878c89c8e69f45fd03635de5336e6713e7ec4e
-
Filesize
978KB
MD5c784cfcf898645b2018a12ca0c67c93f
SHA197a30f8375560c79828106b619ceda10855e8ee7
SHA25688526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f
SHA512807436dce777b67fa11706b1f5bd7852b452f11d57de456750de0ddea36567b497ee5441e8d2dc7db0d456d2a9878c89c8e69f45fd03635de5336e6713e7ec4e
-
Filesize
978KB
MD5c784cfcf898645b2018a12ca0c67c93f
SHA197a30f8375560c79828106b619ceda10855e8ee7
SHA25688526185ca16358110ac8db315e39e06a46c03cd294b87a6ad65895a2cf4cd5f
SHA512807436dce777b67fa11706b1f5bd7852b452f11d57de456750de0ddea36567b497ee5441e8d2dc7db0d456d2a9878c89c8e69f45fd03635de5336e6713e7ec4e