Analysis
-
max time kernel
152s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe
Resource
win10v2004-20220812-en
General
-
Target
22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe
-
Size
180KB
-
MD5
706b322f95583a8df9d2a45b83ca89ba
-
SHA1
a108abb9c1e06ca214a16adaa3f9bddc945624a1
-
SHA256
22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33
-
SHA512
c7ffd8d0fbeb6b37bc941212c16afaa647012f6b51adfa97b659683fe4ee827dc29fa37468dc80b4a1858c79a2ab415e31205aa866e1e2e70fb2b0ae676c5046
-
SSDEEP
3072:aMSncRzAOR+P7HG21+Spp+UzdNyN9fT0J0jZqMN7v:5SncRlR+P7fpwUONNv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1340 JAVA.EXE -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1420 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d2be3e6d11846430c067fc874a79f583.exe JAVA.EXE File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d2be3e6d11846430c067fc874a79f583.exe JAVA.EXE -
Loads dropped DLL 1 IoCs
pid Process 1364 22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\d2be3e6d11846430c067fc874a79f583 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\JAVA.EXE\" .." JAVA.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\d2be3e6d11846430c067fc874a79f583 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\JAVA.EXE\" .." JAVA.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1340 JAVA.EXE 1340 JAVA.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1340 JAVA.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1340 1364 22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe 28 PID 1364 wrote to memory of 1340 1364 22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe 28 PID 1364 wrote to memory of 1340 1364 22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe 28 PID 1364 wrote to memory of 1340 1364 22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe 28 PID 1364 wrote to memory of 1340 1364 22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe 28 PID 1364 wrote to memory of 1340 1364 22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe 28 PID 1364 wrote to memory of 1340 1364 22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe 28 PID 1340 wrote to memory of 1420 1340 JAVA.EXE 29 PID 1340 wrote to memory of 1420 1340 JAVA.EXE 29 PID 1340 wrote to memory of 1420 1340 JAVA.EXE 29 PID 1340 wrote to memory of 1420 1340 JAVA.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe"C:\Users\Admin\AppData\Local\Temp\22c439bfc491845bea0a5f4a809077f265f666ba4206b66769d131d9620f8c33.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\JAVA.EXE"C:\Users\Admin\AppData\Local\Temp\JAVA.EXE"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\JAVA.EXE" "JAVA.EXE" ENABLE3⤵
- Modifies Windows Firewall
PID:1420
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD5f78ee0deaf86e0e13795646bdb2e34d7
SHA1a7d42625a9676fadc49b4be42e44e033ee708067
SHA256544c2e1be7b8733a9ef50cbbb41ec05d995b8664aa6b043bc96dd0d98c825c4b
SHA5126f1b66ef663039156e43911331a9ce1eed6932f986f2df362b3468402770aee1d65bd0e4d743102a64286991ecd37ffa770db50a57515b65a221714bb4e7b487
-
Filesize
125KB
MD5f78ee0deaf86e0e13795646bdb2e34d7
SHA1a7d42625a9676fadc49b4be42e44e033ee708067
SHA256544c2e1be7b8733a9ef50cbbb41ec05d995b8664aa6b043bc96dd0d98c825c4b
SHA5126f1b66ef663039156e43911331a9ce1eed6932f986f2df362b3468402770aee1d65bd0e4d743102a64286991ecd37ffa770db50a57515b65a221714bb4e7b487
-
Filesize
125KB
MD5f78ee0deaf86e0e13795646bdb2e34d7
SHA1a7d42625a9676fadc49b4be42e44e033ee708067
SHA256544c2e1be7b8733a9ef50cbbb41ec05d995b8664aa6b043bc96dd0d98c825c4b
SHA5126f1b66ef663039156e43911331a9ce1eed6932f986f2df362b3468402770aee1d65bd0e4d743102a64286991ecd37ffa770db50a57515b65a221714bb4e7b487