Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 20:55
Static task
static1
Behavioral task
behavioral1
Sample
20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe
Resource
win10v2004-20221111-en
General
-
Target
20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe
-
Size
1.3MB
-
MD5
3b4b1e3d4e829b6321d8d8af52341000
-
SHA1
c1d9657254d60bb0f1e421f9bd72fdaa3a599667
-
SHA256
20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3
-
SHA512
375a1b2c3c330f996e40f1a0f4740d60a5ae1d5326dcbd9c411a7100407eae2e6cb98ac8f7a7d2cf4db42ca7ee069959436611080ad2f9742d9e943d48f474e5
-
SSDEEP
24576:2wP7T3W1mO3U+YYmRFWiXXBnPtt5OYMdcZaLwzg/02YwLdKN5SYg:2wTM9U+YYgFbXvtBLayg/oN5S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1692 TestISP.exe -
Loads dropped DLL 2 IoCs
pid Process 1088 20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe 1692 TestISP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1692 TestISP.exe 1692 TestISP.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1692 1088 20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe 26 PID 1088 wrote to memory of 1692 1088 20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe 26 PID 1088 wrote to memory of 1692 1088 20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe 26 PID 1088 wrote to memory of 1692 1088 20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe"C:\Users\Admin\AppData\Local\Temp\20b40c6df382203fd37748f381e254ee8f1439c7255355eb99f1a9d877243ce3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\~sfx005BBBB660\TestISP.exe"C:\Users\Admin\AppData\Local\Temp\~sfx005BBBB660\TestISP.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD5424a4a595fc79ca707bd3146aea5188e
SHA1f27cabd3c2343242ae4f439b0c7d0b332b81a5bc
SHA25692208676bd302e8746613ac3b7ad18d8306f9f2d666dc3ec421ee0c8098bdc41
SHA5126c1c1305738526d6d8e75f87c787e7dc58d4cbdec0a2ab3a47ee8da64b062af53e4bb68f8b9461f77bde8ccf1fc4884d64e1f6bc30fcdd7cc81f98b6b81cb2d5
-
Filesize
2.6MB
MD5168efd351720bc10a1e7cf8fdf4bd3f4
SHA163fdb14eb369be73773cccbe92ff51c6d3e6ae69
SHA25625ede977ac611593b34bae93bd60de2a45f2880908c49416742ba5263ac46df5
SHA5128c30256583fa97283ee64b391fd13f9de4d3f306109c15cbd2db4949e47b13374088c79cb1ce7680e0a49387c632340661525cb9a1c2c853245bd83b38f52153
-
Filesize
318KB
MD5424a4a595fc79ca707bd3146aea5188e
SHA1f27cabd3c2343242ae4f439b0c7d0b332b81a5bc
SHA25692208676bd302e8746613ac3b7ad18d8306f9f2d666dc3ec421ee0c8098bdc41
SHA5126c1c1305738526d6d8e75f87c787e7dc58d4cbdec0a2ab3a47ee8da64b062af53e4bb68f8b9461f77bde8ccf1fc4884d64e1f6bc30fcdd7cc81f98b6b81cb2d5
-
Filesize
2.6MB
MD5168efd351720bc10a1e7cf8fdf4bd3f4
SHA163fdb14eb369be73773cccbe92ff51c6d3e6ae69
SHA25625ede977ac611593b34bae93bd60de2a45f2880908c49416742ba5263ac46df5
SHA5128c30256583fa97283ee64b391fd13f9de4d3f306109c15cbd2db4949e47b13374088c79cb1ce7680e0a49387c632340661525cb9a1c2c853245bd83b38f52153