Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 23:11
Behavioral task
behavioral1
Sample
d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe
Resource
win10v2004-20220901-en
General
-
Target
d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe
-
Size
915KB
-
MD5
57570b2942a58b3dd43234b93864f627
-
SHA1
df31c2e4c5c967cb0f5f423d0d3f9776083d6f74
-
SHA256
d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e
-
SHA512
8d4791b67a43180b2ad4b3868bea8b196e3ee2cbe2e9018e7282cdad726ebf4baeefb0810398cbe6ab7eea59a14919d785e6428103d6c99fa7059accdc9e2440
-
SSDEEP
24576:OJZZLfupjDElKQERSV40O8t6tTMgeAvgmZ7H2u:OJZZLfaQlKQ0SV4jLZrhZ7H2u
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 888 ijmf.exe 2028 svchost.exe 1832 svchost.exe -
resource yara_rule behavioral1/memory/1552-55-0x0000000000400000-0x0000000002920000-memory.dmp upx behavioral1/files/0x00080000000122f8-58.dat upx behavioral1/memory/1552-67-0x0000000000400000-0x0000000002920000-memory.dmp upx behavioral1/files/0x00080000000122f8-68.dat upx behavioral1/memory/1900-69-0x0000000000270000-0x0000000000280000-memory.dmp upx behavioral1/files/0x00080000000122f8-71.dat upx behavioral1/memory/888-74-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1552-80-0x0000000000400000-0x0000000002920000-memory.dmp upx behavioral1/memory/888-86-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1900 cmd.exe 1692 cmd.exe 1692 cmd.exe 1692 cmd.exe 2028 svchost.exe 1832 svchost.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\user\Scripts\Shutdown attrib.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\user attrib.exe File created C:\Windows\SysWOW64\GroupPolicy\gpt.ini cmd.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini cmd.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\user\Scripts\script.ini xcopy.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\user\Scripts\Startup attrib.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\user\Scripts attrib.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\user\Scripts xcopy.exe File created C:\Windows\SysWOW64\GroupPolicy\user\Scripts\script.ini xcopy.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Progra~1\winrar\rar\ijmf\svchost.dll cmd.exe File opened for modification C:\Progra~1\winrar\rar\ijmf\svchost.ini svchost.exe File created C:\Progra~1\winrar\rar\ijmf\msadotb.htm svchost.exe File created C:\Progra~1\temp.dat cmd.exe File opened for modification C:\Progra~1\winrar\rar\ijmf.exe cmd.exe File opened for modification C:\Progra~1\winrar\rar\svchost.exe cmd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\ime\svchost.exe cmd.exe File opened for modification C:\Windows\ime\svchost.exe cmd.exe File opened for modification C:\Windows\ime\update.dat cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main svchost.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2028 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 1832 svchost.exe Token: SeIncBasePriorityPrivilege 1832 svchost.exe Token: 33 1492 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1492 AUDIODG.EXE Token: 33 1492 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1492 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1832 svchost.exe 1832 svchost.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1900 1552 d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe 28 PID 1552 wrote to memory of 1900 1552 d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe 28 PID 1552 wrote to memory of 1900 1552 d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe 28 PID 1552 wrote to memory of 1900 1552 d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe 28 PID 1900 wrote to memory of 752 1900 cmd.exe 30 PID 1900 wrote to memory of 752 1900 cmd.exe 30 PID 1900 wrote to memory of 752 1900 cmd.exe 30 PID 1900 wrote to memory of 752 1900 cmd.exe 30 PID 1900 wrote to memory of 748 1900 cmd.exe 31 PID 1900 wrote to memory of 748 1900 cmd.exe 31 PID 1900 wrote to memory of 748 1900 cmd.exe 31 PID 1900 wrote to memory of 748 1900 cmd.exe 31 PID 1900 wrote to memory of 1324 1900 cmd.exe 32 PID 1900 wrote to memory of 1324 1900 cmd.exe 32 PID 1900 wrote to memory of 1324 1900 cmd.exe 32 PID 1900 wrote to memory of 1324 1900 cmd.exe 32 PID 1900 wrote to memory of 1324 1900 cmd.exe 32 PID 1900 wrote to memory of 1324 1900 cmd.exe 32 PID 1900 wrote to memory of 1324 1900 cmd.exe 32 PID 1900 wrote to memory of 888 1900 cmd.exe 33 PID 1900 wrote to memory of 888 1900 cmd.exe 33 PID 1900 wrote to memory of 888 1900 cmd.exe 33 PID 1900 wrote to memory of 888 1900 cmd.exe 33 PID 888 wrote to memory of 1692 888 ijmf.exe 34 PID 888 wrote to memory of 1692 888 ijmf.exe 34 PID 888 wrote to memory of 1692 888 ijmf.exe 34 PID 888 wrote to memory of 1692 888 ijmf.exe 34 PID 1692 wrote to memory of 1832 1692 cmd.exe 36 PID 1692 wrote to memory of 1832 1692 cmd.exe 36 PID 1692 wrote to memory of 1832 1692 cmd.exe 36 PID 1692 wrote to memory of 1832 1692 cmd.exe 36 PID 1692 wrote to memory of 2028 1692 cmd.exe 37 PID 1692 wrote to memory of 2028 1692 cmd.exe 37 PID 1692 wrote to memory of 2028 1692 cmd.exe 37 PID 1692 wrote to memory of 2028 1692 cmd.exe 37 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 752 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe"C:\Users\Admin\AppData\Local\Temp\d786cc6dcb8bd51cb9dac17408e7ccb5cadba535653278dfa0cc2e84b9b1b12e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\9898.tmp\sso.bat" "2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\system32\GroupPolicy\*.* -r -s -h /s /d3⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:752
-
-
C:\Windows\SysWOW64\xcopy.exexcopy /y script.ini C:\Windows\System32\GroupPolicy\user\Scripts\3⤵
- Drops file in System32 directory
- Enumerates system info in registry
PID:748
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate /force3⤵PID:1324
-
-
C:\Progra~1\winrar\rar\ijmf.exeC:\Progra~1\winrar\rar\ijmf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\F1B0.tmp\ss1.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Progra~1\winrar\rar\svchost.exeC:\Progra~1\winrar\rar\svchost.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
C:\Windows\ime\svchost.exeC:\Windows\ime\svchost.exe C:\Windows\ime\update.dat,Launch5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.2MB
MD57da9efe7f32b1ed3280531ab2939dd52
SHA146d4d4cd594eb23ec969756cfe7120714f5d6c3e
SHA25616231537c3e38160337c094e96f6f6f4435fb491f3219abf4a3dbe4df3e94dc4
SHA5121c0689d0bcd3e3e54dec97b1b5807e8d0aff0dd9ca3f99c442495f7cee8388916bdfef4d70d17253334d9989ddf4f2e4e09c9bece27c69aaff3d8c4b443afa7d
-
Filesize
9.6MB
MD5b05946f37c0e190699cfbab32cdaaf61
SHA10b8f00c314bf0b4e306d1e5690c87f297115e48b
SHA25645c1894605ceb7a96dd6aeec0fcde38c4db759af0732c26e26abbd1298a867aa
SHA51253bea63b78bdec0f551049713ad1db85eae61828795c65f3bf65b40b5aac384b3505f2c1621413772c5677b9508cbc85f18a94fe23dab2c3efe43312767c2d29
-
Filesize
10.1MB
MD586f92a8d1a279c1dd18868412d2338b2
SHA1b7acc17f3e345b8f33b26ea93ec82565a5d29c03
SHA256e7d985c796d4a53d21025b5cb22fa3d8bb52ad77ad3fe2e715b92fd91648954d
SHA5126a5e370039057d2ff4df52413cb5503d439cbc21f6a13830025da8a0ce30da9b2b2a55f5f39e8fa46bdb4912b0251c2607ea7995ed5a6bac58c52af4189b5778
-
Filesize
9.6MB
MD5b05946f37c0e190699cfbab32cdaaf61
SHA10b8f00c314bf0b4e306d1e5690c87f297115e48b
SHA25645c1894605ceb7a96dd6aeec0fcde38c4db759af0732c26e26abbd1298a867aa
SHA51253bea63b78bdec0f551049713ad1db85eae61828795c65f3bf65b40b5aac384b3505f2c1621413772c5677b9508cbc85f18a94fe23dab2c3efe43312767c2d29
-
Filesize
205B
MD5ee014a642268b4575e00f1f557165363
SHA1f4b1c8166c5656d62a381ab3156e5ff9bc7a3041
SHA256fbb0844a52bb1ac1ab1943e64d15366ce7b81a9129201a787ce52ebd6a434d59
SHA5120e38ec80b1b51cfe93f19c65f791f85ea305b8e1e0a388ad6abc942cf368a36c8d9b36a0b3cf49fa28465ae7fd707f3482dd3283ae3e63ea5b33f23403ec0bbb
-
Filesize
6.2MB
MD57da9efe7f32b1ed3280531ab2939dd52
SHA146d4d4cd594eb23ec969756cfe7120714f5d6c3e
SHA25616231537c3e38160337c094e96f6f6f4435fb491f3219abf4a3dbe4df3e94dc4
SHA5121c0689d0bcd3e3e54dec97b1b5807e8d0aff0dd9ca3f99c442495f7cee8388916bdfef4d70d17253334d9989ddf4f2e4e09c9bece27c69aaff3d8c4b443afa7d
-
Filesize
9.6MB
MD5b05946f37c0e190699cfbab32cdaaf61
SHA10b8f00c314bf0b4e306d1e5690c87f297115e48b
SHA25645c1894605ceb7a96dd6aeec0fcde38c4db759af0732c26e26abbd1298a867aa
SHA51253bea63b78bdec0f551049713ad1db85eae61828795c65f3bf65b40b5aac384b3505f2c1621413772c5677b9508cbc85f18a94fe23dab2c3efe43312767c2d29
-
Filesize
10.1MB
MD586f92a8d1a279c1dd18868412d2338b2
SHA1b7acc17f3e345b8f33b26ea93ec82565a5d29c03
SHA256e7d985c796d4a53d21025b5cb22fa3d8bb52ad77ad3fe2e715b92fd91648954d
SHA5126a5e370039057d2ff4df52413cb5503d439cbc21f6a13830025da8a0ce30da9b2b2a55f5f39e8fa46bdb4912b0251c2607ea7995ed5a6bac58c52af4189b5778
-
Filesize
1KB
MD51d245ea97d0db5b3b4404f2d01470bf6
SHA12915edb8365a05ec97ec6c54eb4db076248a926d
SHA2569cb513ebfa42cdbbe078a4576246e56e28762c684fb74ac58344cd812811d528
SHA51291a285b15788b84ce2ee2ce8e7ca8c3d2d166aa7d66569c72fffd57bd0c54e6be2009df8c2c25f89c1d1ee6bc8278cf55aeb5eac21318b778070735d084fa3e2
-
Filesize
11.1MB
MD54777fdc0a1b3bf990a8fd20991a990b6
SHA1a12a8878586527df09fe89a788c85b7acc9f7a69
SHA256ac21b8c6fb91d3daf95e2d359e8cf7add2b047c36d0157228aaea0cec7db7983
SHA5123e7ec26ae8a646f647f03867f8160d4f89c2bed2dbaa865ac9f413112b33bc6f6283cd7a8a3074db61a86f2e3526dac8fe14603853c7c5cf1818ef9117785eae
-
Filesize
103B
MD509efc00b239d2a92a065f4f94820500c
SHA17d66f781174a77da465d066f003e149c2e61a7d3
SHA256ecc7bc8655292d1397246d87cafd25953ffb1a0e53dc17a8a1ca9d6ba0a76062
SHA512efff235bc25e293d34c4b5e975310a4801edd2168af36089553319d5733e39f5d845214b347685acfa708196e24bcc825885a5ea6fc73655c28869add7ff988b
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
205B
MD5ee014a642268b4575e00f1f557165363
SHA1f4b1c8166c5656d62a381ab3156e5ff9bc7a3041
SHA256fbb0844a52bb1ac1ab1943e64d15366ce7b81a9129201a787ce52ebd6a434d59
SHA5120e38ec80b1b51cfe93f19c65f791f85ea305b8e1e0a388ad6abc942cf368a36c8d9b36a0b3cf49fa28465ae7fd707f3482dd3283ae3e63ea5b33f23403ec0bbb
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
11.1MB
MD54777fdc0a1b3bf990a8fd20991a990b6
SHA1a12a8878586527df09fe89a788c85b7acc9f7a69
SHA256ac21b8c6fb91d3daf95e2d359e8cf7add2b047c36d0157228aaea0cec7db7983
SHA5123e7ec26ae8a646f647f03867f8160d4f89c2bed2dbaa865ac9f413112b33bc6f6283cd7a8a3074db61a86f2e3526dac8fe14603853c7c5cf1818ef9117785eae
-
Filesize
6.2MB
MD57da9efe7f32b1ed3280531ab2939dd52
SHA146d4d4cd594eb23ec969756cfe7120714f5d6c3e
SHA25616231537c3e38160337c094e96f6f6f4435fb491f3219abf4a3dbe4df3e94dc4
SHA5121c0689d0bcd3e3e54dec97b1b5807e8d0aff0dd9ca3f99c442495f7cee8388916bdfef4d70d17253334d9989ddf4f2e4e09c9bece27c69aaff3d8c4b443afa7d
-
Filesize
10.1MB
MD586f92a8d1a279c1dd18868412d2338b2
SHA1b7acc17f3e345b8f33b26ea93ec82565a5d29c03
SHA256e7d985c796d4a53d21025b5cb22fa3d8bb52ad77ad3fe2e715b92fd91648954d
SHA5126a5e370039057d2ff4df52413cb5503d439cbc21f6a13830025da8a0ce30da9b2b2a55f5f39e8fa46bdb4912b0251c2607ea7995ed5a6bac58c52af4189b5778
-
Filesize
9.6MB
MD5b05946f37c0e190699cfbab32cdaaf61
SHA10b8f00c314bf0b4e306d1e5690c87f297115e48b
SHA25645c1894605ceb7a96dd6aeec0fcde38c4db759af0732c26e26abbd1298a867aa
SHA51253bea63b78bdec0f551049713ad1db85eae61828795c65f3bf65b40b5aac384b3505f2c1621413772c5677b9508cbc85f18a94fe23dab2c3efe43312767c2d29
-
Filesize
9.6MB
MD5b05946f37c0e190699cfbab32cdaaf61
SHA10b8f00c314bf0b4e306d1e5690c87f297115e48b
SHA25645c1894605ceb7a96dd6aeec0fcde38c4db759af0732c26e26abbd1298a867aa
SHA51253bea63b78bdec0f551049713ad1db85eae61828795c65f3bf65b40b5aac384b3505f2c1621413772c5677b9508cbc85f18a94fe23dab2c3efe43312767c2d29
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
11.1MB
MD54777fdc0a1b3bf990a8fd20991a990b6
SHA1a12a8878586527df09fe89a788c85b7acc9f7a69
SHA256ac21b8c6fb91d3daf95e2d359e8cf7add2b047c36d0157228aaea0cec7db7983
SHA5123e7ec26ae8a646f647f03867f8160d4f89c2bed2dbaa865ac9f413112b33bc6f6283cd7a8a3074db61a86f2e3526dac8fe14603853c7c5cf1818ef9117785eae