Analysis
-
max time kernel
59s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 22:04
Static task
static1
Behavioral task
behavioral1
Sample
a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe
Resource
win10v2004-20220812-en
General
-
Target
a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe
-
Size
41KB
-
MD5
ec33976b3011688c413a11e447cc8cc8
-
SHA1
aafec04e967cd4fac2d51252d56c1d9e3aca950b
-
SHA256
a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0
-
SHA512
c5f2b23a7c590d940de67620e38fbe21a4030e8ae4e560601dc0405465832b27b89f34c4ffe02965b7d42fddbd25331ef8b5ef113a4279d2a657c7b3f00895e6
-
SSDEEP
768:QIBar1ZIZYnfI9opm6AIHIjaI7g9mVmUn2oNE/W5dRV8:pW1ZIZqI9opm6AIHIjzmUXNzd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1564 sxhost.exe -
Deletes itself 1 IoCs
pid Process 1428 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 892 wrote to memory of 1564 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 28 PID 892 wrote to memory of 1564 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 28 PID 892 wrote to memory of 1564 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 28 PID 892 wrote to memory of 1564 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 28 PID 892 wrote to memory of 1428 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 29 PID 892 wrote to memory of 1428 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 29 PID 892 wrote to memory of 1428 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 29 PID 892 wrote to memory of 1428 892 a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe 29 PID 1564 wrote to memory of 1772 1564 sxhost.exe 33 PID 1564 wrote to memory of 1772 1564 sxhost.exe 33 PID 1564 wrote to memory of 1772 1564 sxhost.exe 33 PID 1564 wrote to memory of 1772 1564 sxhost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe"C:\Users\Admin\AppData\Local\Temp\a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:1772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A008FE~1.EXE >> NUL2⤵
- Deletes itself
PID:1428
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5ec33976b3011688c413a11e447cc8cc8
SHA1aafec04e967cd4fac2d51252d56c1d9e3aca950b
SHA256a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0
SHA512c5f2b23a7c590d940de67620e38fbe21a4030e8ae4e560601dc0405465832b27b89f34c4ffe02965b7d42fddbd25331ef8b5ef113a4279d2a657c7b3f00895e6
-
Filesize
41KB
MD5ec33976b3011688c413a11e447cc8cc8
SHA1aafec04e967cd4fac2d51252d56c1d9e3aca950b
SHA256a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0
SHA512c5f2b23a7c590d940de67620e38fbe21a4030e8ae4e560601dc0405465832b27b89f34c4ffe02965b7d42fddbd25331ef8b5ef113a4279d2a657c7b3f00895e6
-
Filesize
41KB
MD5ec33976b3011688c413a11e447cc8cc8
SHA1aafec04e967cd4fac2d51252d56c1d9e3aca950b
SHA256a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0
SHA512c5f2b23a7c590d940de67620e38fbe21a4030e8ae4e560601dc0405465832b27b89f34c4ffe02965b7d42fddbd25331ef8b5ef113a4279d2a657c7b3f00895e6
-
Filesize
41KB
MD5ec33976b3011688c413a11e447cc8cc8
SHA1aafec04e967cd4fac2d51252d56c1d9e3aca950b
SHA256a008fe4f80ed3aa2fea192c8056b2a9c84f43c1d43c13ac5e569c3ec74c4f0c0
SHA512c5f2b23a7c590d940de67620e38fbe21a4030e8ae4e560601dc0405465832b27b89f34c4ffe02965b7d42fddbd25331ef8b5ef113a4279d2a657c7b3f00895e6