Analysis
-
max time kernel
33s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe
Resource
win10v2004-20221111-en
General
-
Target
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe
-
Size
304KB
-
MD5
681204c9c0b31d262f46ad5080fdd5f5
-
SHA1
17d1f015e93c00bf85c17ef3a258ebdc0502b28f
-
SHA256
ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b
-
SHA512
50291b540f75cef9a4fef5e699fe2f111084f96d63a265309f9cb08ee2ab048771e8ec5fb8516c14db9acd680d181e19c215ef884fce55d566c70939f39eed14
-
SSDEEP
6144:K2oiYVGfWJ62thHhRq+XS9AdAlHZLvvZF9lJM+mN9opqU0Dh7FC7hN7GScVn:KyxWJ623hRNC9WANFe+gA6D3avan
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1408 bpehnn.exe -
Deletes itself 1 IoCs
pid Process 2028 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 2028 cmd.exe 2028 cmd.exe 1408 bpehnn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1284 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1784 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1284 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 880 wrote to memory of 2028 880 ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe 27 PID 880 wrote to memory of 2028 880 ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe 27 PID 880 wrote to memory of 2028 880 ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe 27 PID 880 wrote to memory of 2028 880 ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe 27 PID 2028 wrote to memory of 1284 2028 cmd.exe 29 PID 2028 wrote to memory of 1284 2028 cmd.exe 29 PID 2028 wrote to memory of 1284 2028 cmd.exe 29 PID 2028 wrote to memory of 1284 2028 cmd.exe 29 PID 2028 wrote to memory of 1784 2028 cmd.exe 31 PID 2028 wrote to memory of 1784 2028 cmd.exe 31 PID 2028 wrote to memory of 1784 2028 cmd.exe 31 PID 2028 wrote to memory of 1784 2028 cmd.exe 31 PID 2028 wrote to memory of 1408 2028 cmd.exe 32 PID 2028 wrote to memory of 1408 2028 cmd.exe 32 PID 2028 wrote to memory of 1408 2028 cmd.exe 32 PID 2028 wrote to memory of 1408 2028 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe"C:\Users\Admin\AppData\Local\Temp\ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 880 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b.exe" & start C:\Users\Admin\AppData\Local\bpehnn.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 8803⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:1784
-
-
C:\Users\Admin\AppData\Local\bpehnn.exeC:\Users\Admin\AppData\Local\bpehnn.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD5681204c9c0b31d262f46ad5080fdd5f5
SHA117d1f015e93c00bf85c17ef3a258ebdc0502b28f
SHA256ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b
SHA51250291b540f75cef9a4fef5e699fe2f111084f96d63a265309f9cb08ee2ab048771e8ec5fb8516c14db9acd680d181e19c215ef884fce55d566c70939f39eed14
-
Filesize
304KB
MD5681204c9c0b31d262f46ad5080fdd5f5
SHA117d1f015e93c00bf85c17ef3a258ebdc0502b28f
SHA256ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b
SHA51250291b540f75cef9a4fef5e699fe2f111084f96d63a265309f9cb08ee2ab048771e8ec5fb8516c14db9acd680d181e19c215ef884fce55d566c70939f39eed14
-
Filesize
304KB
MD5681204c9c0b31d262f46ad5080fdd5f5
SHA117d1f015e93c00bf85c17ef3a258ebdc0502b28f
SHA256ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b
SHA51250291b540f75cef9a4fef5e699fe2f111084f96d63a265309f9cb08ee2ab048771e8ec5fb8516c14db9acd680d181e19c215ef884fce55d566c70939f39eed14
-
Filesize
304KB
MD5681204c9c0b31d262f46ad5080fdd5f5
SHA117d1f015e93c00bf85c17ef3a258ebdc0502b28f
SHA256ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b
SHA51250291b540f75cef9a4fef5e699fe2f111084f96d63a265309f9cb08ee2ab048771e8ec5fb8516c14db9acd680d181e19c215ef884fce55d566c70939f39eed14
-
Filesize
304KB
MD5681204c9c0b31d262f46ad5080fdd5f5
SHA117d1f015e93c00bf85c17ef3a258ebdc0502b28f
SHA256ce2aa7253ec42e40bf20cb62a0d1c9bd5fcc5a302069fd90ae4f44d48503b95b
SHA51250291b540f75cef9a4fef5e699fe2f111084f96d63a265309f9cb08ee2ab048771e8ec5fb8516c14db9acd680d181e19c215ef884fce55d566c70939f39eed14