Analysis
-
max time kernel
66s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe
Resource
win10v2004-20221111-en
General
-
Target
ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe
-
Size
43KB
-
MD5
441eedfb24afc2573fbe1c374fb2f42e
-
SHA1
58e1674e7e521c2d342ff3eff6f97e7ad660e827
-
SHA256
ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e
-
SHA512
9e46b03eb10db815b34459fdc1e4f33781466fc4cb3b629f357d8b7448ae6b015fd3c1ce4788e1adcac7933fe0635e2092531d9f1b8241f85e8c5079c702c2ba
-
SSDEEP
768:q+D/1865QbrS+eUfOrm9uTx22R581J6H2jHeAqvtK18/Il1DxcNdGHuHCCjPkaK7:lKuchsm02blcRHCCrk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 672 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 776 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe Trojan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe Trojan.exe -
Loads dropped DLL 1 IoCs
pid Process 872 ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 672 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 672 Trojan.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 872 wrote to memory of 672 872 ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe 27 PID 872 wrote to memory of 672 872 ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe 27 PID 872 wrote to memory of 672 872 ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe 27 PID 872 wrote to memory of 672 872 ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe 27 PID 672 wrote to memory of 776 672 Trojan.exe 28 PID 672 wrote to memory of 776 672 Trojan.exe 28 PID 672 wrote to memory of 776 672 Trojan.exe 28 PID 672 wrote to memory of 776 672 Trojan.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe"C:\Users\Admin\AppData\Local\Temp\ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5441eedfb24afc2573fbe1c374fb2f42e
SHA158e1674e7e521c2d342ff3eff6f97e7ad660e827
SHA256ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e
SHA5129e46b03eb10db815b34459fdc1e4f33781466fc4cb3b629f357d8b7448ae6b015fd3c1ce4788e1adcac7933fe0635e2092531d9f1b8241f85e8c5079c702c2ba
-
Filesize
43KB
MD5441eedfb24afc2573fbe1c374fb2f42e
SHA158e1674e7e521c2d342ff3eff6f97e7ad660e827
SHA256ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e
SHA5129e46b03eb10db815b34459fdc1e4f33781466fc4cb3b629f357d8b7448ae6b015fd3c1ce4788e1adcac7933fe0635e2092531d9f1b8241f85e8c5079c702c2ba
-
Filesize
43KB
MD5441eedfb24afc2573fbe1c374fb2f42e
SHA158e1674e7e521c2d342ff3eff6f97e7ad660e827
SHA256ca7315ebdaab70930cd741d1a571b6a5a1ff9760a5e746568442165d637adc2e
SHA5129e46b03eb10db815b34459fdc1e4f33781466fc4cb3b629f357d8b7448ae6b015fd3c1ce4788e1adcac7933fe0635e2092531d9f1b8241f85e8c5079c702c2ba