Analysis
-
max time kernel
190s -
max time network
234s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
629928a08a33a9a226b3922273c8ba95
-
SHA1
5f7dfc896763e242e039ac513f4ddb3db1077467
-
SHA256
0f3fe0c5e38cbabd6d0e2622586d5d1850169131555f6bd09529f62cbc4add9c
-
SHA512
f6846b63e9a40f2b4cb519c1e8f2f3a761901fe218649ccaa7766b0776a367a4fe5f7276b71d2b6f12084eef727612f8785807e1e5d444828b312d078f879beb
-
SSDEEP
196608:91Ol3enGVEnUFgLBaWo1ft1cp2xUeWbbf310eh:3OlOnGVEnUGVmfA5Pvf310C
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1968 Install.exe 556 Install.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 8 IoCs
pid Process 1776 file.exe 1968 Install.exe 1968 Install.exe 1968 Install.exe 1968 Install.exe 556 Install.exe 556 Install.exe 556 Install.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\bdgVPSIBMXnLzIkafb.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1612 schtasks.exe 1056 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1988 powershell.EXE 1988 powershell.EXE 1988 powershell.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1988 powershell.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1968 1776 file.exe 27 PID 1776 wrote to memory of 1968 1776 file.exe 27 PID 1776 wrote to memory of 1968 1776 file.exe 27 PID 1776 wrote to memory of 1968 1776 file.exe 27 PID 1776 wrote to memory of 1968 1776 file.exe 27 PID 1776 wrote to memory of 1968 1776 file.exe 27 PID 1776 wrote to memory of 1968 1776 file.exe 27 PID 1968 wrote to memory of 556 1968 Install.exe 28 PID 1968 wrote to memory of 556 1968 Install.exe 28 PID 1968 wrote to memory of 556 1968 Install.exe 28 PID 1968 wrote to memory of 556 1968 Install.exe 28 PID 1968 wrote to memory of 556 1968 Install.exe 28 PID 1968 wrote to memory of 556 1968 Install.exe 28 PID 1968 wrote to memory of 556 1968 Install.exe 28 PID 556 wrote to memory of 1276 556 Install.exe 30 PID 556 wrote to memory of 1276 556 Install.exe 30 PID 556 wrote to memory of 1276 556 Install.exe 30 PID 556 wrote to memory of 1276 556 Install.exe 30 PID 556 wrote to memory of 1276 556 Install.exe 30 PID 556 wrote to memory of 1276 556 Install.exe 30 PID 556 wrote to memory of 1276 556 Install.exe 30 PID 556 wrote to memory of 1096 556 Install.exe 32 PID 556 wrote to memory of 1096 556 Install.exe 32 PID 556 wrote to memory of 1096 556 Install.exe 32 PID 556 wrote to memory of 1096 556 Install.exe 32 PID 556 wrote to memory of 1096 556 Install.exe 32 PID 556 wrote to memory of 1096 556 Install.exe 32 PID 556 wrote to memory of 1096 556 Install.exe 32 PID 1276 wrote to memory of 976 1276 forfiles.exe 34 PID 1276 wrote to memory of 976 1276 forfiles.exe 34 PID 1276 wrote to memory of 976 1276 forfiles.exe 34 PID 1276 wrote to memory of 976 1276 forfiles.exe 34 PID 1276 wrote to memory of 976 1276 forfiles.exe 34 PID 1276 wrote to memory of 976 1276 forfiles.exe 34 PID 1276 wrote to memory of 976 1276 forfiles.exe 34 PID 1096 wrote to memory of 1408 1096 forfiles.exe 35 PID 1096 wrote to memory of 1408 1096 forfiles.exe 35 PID 1096 wrote to memory of 1408 1096 forfiles.exe 35 PID 1096 wrote to memory of 1408 1096 forfiles.exe 35 PID 1096 wrote to memory of 1408 1096 forfiles.exe 35 PID 1096 wrote to memory of 1408 1096 forfiles.exe 35 PID 1096 wrote to memory of 1408 1096 forfiles.exe 35 PID 976 wrote to memory of 1336 976 cmd.exe 36 PID 976 wrote to memory of 1336 976 cmd.exe 36 PID 976 wrote to memory of 1336 976 cmd.exe 36 PID 976 wrote to memory of 1336 976 cmd.exe 36 PID 976 wrote to memory of 1336 976 cmd.exe 36 PID 976 wrote to memory of 1336 976 cmd.exe 36 PID 976 wrote to memory of 1336 976 cmd.exe 36 PID 1408 wrote to memory of 1876 1408 cmd.exe 37 PID 1408 wrote to memory of 1876 1408 cmd.exe 37 PID 1408 wrote to memory of 1876 1408 cmd.exe 37 PID 1408 wrote to memory of 1876 1408 cmd.exe 37 PID 1408 wrote to memory of 1876 1408 cmd.exe 37 PID 1408 wrote to memory of 1876 1408 cmd.exe 37 PID 1408 wrote to memory of 1876 1408 cmd.exe 37 PID 976 wrote to memory of 1632 976 cmd.exe 38 PID 976 wrote to memory of 1632 976 cmd.exe 38 PID 976 wrote to memory of 1632 976 cmd.exe 38 PID 976 wrote to memory of 1632 976 cmd.exe 38 PID 976 wrote to memory of 1632 976 cmd.exe 38 PID 976 wrote to memory of 1632 976 cmd.exe 38 PID 976 wrote to memory of 1632 976 cmd.exe 38 PID 1408 wrote to memory of 732 1408 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\7zS6614.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\7zS6DC1.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:976 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:1336
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1632
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1876
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:732
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gepJzHQdP" /SC once /ST 18:30:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1612
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gepJzHQdP"4⤵PID:1364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gepJzHQdP"4⤵PID:2044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bdgVPSIBMXnLzIkafb" /SC once /ST 20:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\DqHUxWxWZRUkhfJgL\ZoWBWsVxzERycRb\nOqAeEX.exe\" 50 /site_id 525403 /S" /V1 /F4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1056
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {26CF098E-2564-4652-AFCF-316FFAAECD7B} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵PID:1804
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:528
-
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1884
-
C:\Windows\system32\taskeng.exetaskeng.exe {551063D6-E1D3-4F1A-B3E8-7C8091B69FEC} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.2MB
MD5f884119a6502d39a4bcec47ad87fb15d
SHA199fa5cc36ebe3cd908c363042c7e395a50c7ded1
SHA2567cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770
SHA512ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381
-
Filesize
6.2MB
MD5f884119a6502d39a4bcec47ad87fb15d
SHA199fa5cc36ebe3cd908c363042c7e395a50c7ded1
SHA2567cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770
SHA512ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381
-
Filesize
6.7MB
MD544e8ebce6ceebb62ef6df808272f2512
SHA1066252719556f1e28546695b7e82edde87f438bd
SHA2568097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282
SHA512efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69
-
Filesize
6.7MB
MD544e8ebce6ceebb62ef6df808272f2512
SHA1066252719556f1e28546695b7e82edde87f438bd
SHA2568097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282
SHA512efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69
-
Filesize
6.2MB
MD5f884119a6502d39a4bcec47ad87fb15d
SHA199fa5cc36ebe3cd908c363042c7e395a50c7ded1
SHA2567cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770
SHA512ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381
-
Filesize
6.2MB
MD5f884119a6502d39a4bcec47ad87fb15d
SHA199fa5cc36ebe3cd908c363042c7e395a50c7ded1
SHA2567cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770
SHA512ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381
-
Filesize
6.2MB
MD5f884119a6502d39a4bcec47ad87fb15d
SHA199fa5cc36ebe3cd908c363042c7e395a50c7ded1
SHA2567cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770
SHA512ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381
-
Filesize
6.2MB
MD5f884119a6502d39a4bcec47ad87fb15d
SHA199fa5cc36ebe3cd908c363042c7e395a50c7ded1
SHA2567cd03192d79b9e9f60c2e067374f665a05899928c92aa758d9d0ca467fdee770
SHA512ed919fdbefc2f06a011ff92869e9c18f0efa07dd0189e3b72ad1b6139b30fdef8ca053ee2236ca9ccda9e05dd0dc168aa21447fe0337fb85fc8b7fba3ddcc381
-
Filesize
6.7MB
MD544e8ebce6ceebb62ef6df808272f2512
SHA1066252719556f1e28546695b7e82edde87f438bd
SHA2568097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282
SHA512efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69
-
Filesize
6.7MB
MD544e8ebce6ceebb62ef6df808272f2512
SHA1066252719556f1e28546695b7e82edde87f438bd
SHA2568097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282
SHA512efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69
-
Filesize
6.7MB
MD544e8ebce6ceebb62ef6df808272f2512
SHA1066252719556f1e28546695b7e82edde87f438bd
SHA2568097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282
SHA512efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69
-
Filesize
6.7MB
MD544e8ebce6ceebb62ef6df808272f2512
SHA1066252719556f1e28546695b7e82edde87f438bd
SHA2568097f017ea10daf15527755b369dbcf4151bd7a15da85f6f6fe6ba8dcb972282
SHA512efdd4fd8c0062b51dc33c394e624e7559c17cfbddd4de7771a4f1742ddea8bb50e17dbb18554cd78655aa3153aa6987df047d19d68178e75d3e642e790155c69