Analysis
-
max time kernel
45s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 23:53
Behavioral task
behavioral1
Sample
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe
Resource
win7-20220901-en
General
-
Target
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe
-
Size
57KB
-
MD5
8f3abbb6c30b9e2e4e72b0e8f192aaa6
-
SHA1
19cc26ff5509c85520732828ec2085d52e18f33a
-
SHA256
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78
-
SHA512
e7f52358416f3c8567c1361546ae274c9c5685290f05e058135ee03b4125fef8729de5ce05daa5a34345042477fba3ca86f6cb856415634bb8161965c17e7938
-
SSDEEP
1536:mkazcVn2gSpl9vxWgfb0ZqU1T4dEIi4Jnf/qrqe71G:c82gI9vcGEJ4dEIzJf/iqyG
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Possible privilege escalation attempt 2 IoCs
Processes:
takeown.exeicacls.exepid process 268 takeown.exe 1528 icacls.exe -
Processes:
resource yara_rule behavioral1/memory/1340-60-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Modifies file permissions 1 TTPs 2 IoCs
Processes:
takeown.exeicacls.exepid process 268 takeown.exe 1528 icacls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.execmd.exedescription pid process target process PID 1340 wrote to memory of 1036 1340 2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe cmd.exe PID 1340 wrote to memory of 1036 1340 2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe cmd.exe PID 1340 wrote to memory of 1036 1340 2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe cmd.exe PID 1340 wrote to memory of 1036 1340 2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe cmd.exe PID 1036 wrote to memory of 268 1036 cmd.exe takeown.exe PID 1036 wrote to memory of 268 1036 cmd.exe takeown.exe PID 1036 wrote to memory of 268 1036 cmd.exe takeown.exe PID 1036 wrote to memory of 268 1036 cmd.exe takeown.exe PID 1036 wrote to memory of 1528 1036 cmd.exe icacls.exe PID 1036 wrote to memory of 1528 1036 cmd.exe icacls.exe PID 1036 wrote to memory of 1528 1036 cmd.exe icacls.exe PID 1036 wrote to memory of 1528 1036 cmd.exe icacls.exe PID 1036 wrote to memory of 1536 1036 cmd.exe attrib.exe PID 1036 wrote to memory of 1536 1036 cmd.exe attrib.exe PID 1036 wrote to memory of 1536 1036 cmd.exe attrib.exe PID 1036 wrote to memory of 1536 1036 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe"C:\Users\Admin\AppData\Local\Temp\2c59bd81eb6cb54781d9dc09a54a86e66d1a82781cf5f19b0510433cdb9a6a78.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\test.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\takeown.exetakeown /f "C:\Windows\system32\drivers\etc\hosts"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:268 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Windows\system32\drivers\etc\hosts" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1528 -
C:\Windows\SysWOW64\attrib.exeattrib -s -h -r C:\Windows\system32\drivers\etc\hosts3⤵
- Views/modifies file attributes
PID:1536
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e42d4acc898ba6eafca28660001d2aed
SHA140be1464a04153eca0d7fef0967e475b6d9062af
SHA25680dc20a3b0fe1c390e5a54cecb019a311de5ef9a5436c8a4c7eb5797f40e6da1
SHA51292b6c7d67c053d3b0380b1feda04f2401975f9761651634a24baa73591780b89466d12e79e11f9c20eb93b80e962bbb7cf8277b1f503a34f110753a1a50a70e8