Analysis
-
max time kernel
162s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe
Resource
win10v2004-20221111-en
General
-
Target
ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe
-
Size
213KB
-
MD5
0949d4dafbf6bbfa8bbedcd1016272a7
-
SHA1
bad56c5ff82bafa4ec3639dbab68ac5fc6fc69ee
-
SHA256
ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18
-
SHA512
c833f9ffbc6410d9115dc7a93ad18df44239b35dd448298179e97437486ff05c48a0e536c4506ea66819532c2f525b17a8f312b514491a0a9a524538400ada44
-
SSDEEP
6144:E/0uosDAv8QMGQ1LWvPEPIAdR12FNfL1L:EJDDAv8QMjwkPhYf
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1616 ×¢²á±í~1.EXE 1480 AssistRegCleaner.exe 688 web.exe -
resource yara_rule behavioral1/files/0x000a0000000133e5-63.dat upx behavioral1/files/0x000a0000000133e5-65.dat upx behavioral1/files/0x000a0000000133e5-67.dat upx behavioral1/files/0x000a0000000133e5-70.dat upx behavioral1/files/0x000a0000000133e5-71.dat upx behavioral1/memory/1248-72-0x0000000000210000-0x0000000000220000-memory.dmp upx behavioral1/memory/688-74-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1248-80-0x0000000000210000-0x0000000000220000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 1616 ×¢²á±í~1.EXE 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 688 web.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\AssistRegCleaner.exe ×¢²á±í~1.EXE File created C:\Windows\TweakAssistKrnl.dll ×¢²á±í~1.EXE File opened for modification C:\Windows\TweakAssistKrnl.dll ×¢²á±í~1.EXE File created C:\Windows\__tmp_rar_sfx_access_check_7129386 ×¢²á±í~1.EXE File created C:\Windows\AssistRegCleaner.exe ×¢²á±í~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 760 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1480 AssistRegCleaner.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1480 AssistRegCleaner.exe 1480 AssistRegCleaner.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1616 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 28 PID 1248 wrote to memory of 1616 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 28 PID 1248 wrote to memory of 1616 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 28 PID 1248 wrote to memory of 1616 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 28 PID 1248 wrote to memory of 1616 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 28 PID 1248 wrote to memory of 1616 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 28 PID 1248 wrote to memory of 1616 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 28 PID 1616 wrote to memory of 1480 1616 ×¢²á±í~1.EXE 29 PID 1616 wrote to memory of 1480 1616 ×¢²á±í~1.EXE 29 PID 1616 wrote to memory of 1480 1616 ×¢²á±í~1.EXE 29 PID 1616 wrote to memory of 1480 1616 ×¢²á±í~1.EXE 29 PID 1616 wrote to memory of 1480 1616 ×¢²á±í~1.EXE 29 PID 1616 wrote to memory of 1480 1616 ×¢²á±í~1.EXE 29 PID 1616 wrote to memory of 1480 1616 ×¢²á±í~1.EXE 29 PID 1248 wrote to memory of 688 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 30 PID 1248 wrote to memory of 688 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 30 PID 1248 wrote to memory of 688 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 30 PID 1248 wrote to memory of 688 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 30 PID 1248 wrote to memory of 688 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 30 PID 1248 wrote to memory of 688 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 30 PID 1248 wrote to memory of 688 1248 ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe 30 PID 688 wrote to memory of 1732 688 web.exe 31 PID 688 wrote to memory of 1732 688 web.exe 31 PID 688 wrote to memory of 1732 688 web.exe 31 PID 688 wrote to memory of 1732 688 web.exe 31 PID 688 wrote to memory of 1732 688 web.exe 31 PID 688 wrote to memory of 1732 688 web.exe 31 PID 688 wrote to memory of 1732 688 web.exe 31 PID 1732 wrote to memory of 760 1732 cmd.exe 33 PID 1732 wrote to memory of 760 1732 cmd.exe 33 PID 1732 wrote to memory of 760 1732 cmd.exe 33 PID 1732 wrote to memory of 760 1732 cmd.exe 33 PID 1732 wrote to memory of 760 1732 cmd.exe 33 PID 1732 wrote to memory of 760 1732 cmd.exe 33 PID 1732 wrote to memory of 760 1732 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe"C:\Users\Admin\AppData\Local\Temp\ef9232ca6e23d0dc056bc921ee1d5d07bf5998d23c8cb6b69a2a054019a9ad18.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\×¢²á±í~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\×¢²á±í~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\AssistRegCleaner.exe"C:\Windows\AssistRegCleaner.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\web.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\web.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CA04.tmp\web.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 6004⤵
- Runs ping.exe
PID:760
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fda3e25a1ee4d7f053004df89a2c986c
SHA1866b58b545e1e029ed948b35a666a49e386e4eca
SHA25601dfe302ef72c7df11dece3a9fcfdbf5f1da21fa8d2003fd17b3fb8f1e7936cb
SHA5127b258ee1d60c6825c4cacea80a2906b6ed5d7d04961efea8e079478d2b95dd55b960bb0478c3731bb9f41372710655467292ea1bda116d7ea3daf13584038ac8
-
Filesize
21KB
MD525c32f16fc416fb33ce0db91d23a2b50
SHA100cd581f37c5427445f7b5b95f8ffba5a558038c
SHA2566f3b3f992a7877ee57889fd092e7d58c8840fcef8ba08c167f7664995c3d10dd
SHA5126fc402ae076bfe58275bbcc7509baf7559a627850352237521c2f020724f02376357b3d97da17643a451153186074651feca338eae7f9f58c698c31f2c5f9584
-
Filesize
21KB
MD525c32f16fc416fb33ce0db91d23a2b50
SHA100cd581f37c5427445f7b5b95f8ffba5a558038c
SHA2566f3b3f992a7877ee57889fd092e7d58c8840fcef8ba08c167f7664995c3d10dd
SHA5126fc402ae076bfe58275bbcc7509baf7559a627850352237521c2f020724f02376357b3d97da17643a451153186074651feca338eae7f9f58c698c31f2c5f9584
-
Filesize
188KB
MD5002aaee3c65562e7b9aa42abada9ef83
SHA1ec2855ed55824f8cb03108b449fbc79fdd39083d
SHA25623db036919cff1e038926d68086beea9d5c14a6b9e9504706a37791ce43fcdb8
SHA512feacd408f9ccab3283933b7600483a3dc1f533c8e181d86c467e267d07db9fb7d60426129480936b10bdb3235d6752f99e7c9eb3a40e78db277e689d80374db5
-
Filesize
188KB
MD5002aaee3c65562e7b9aa42abada9ef83
SHA1ec2855ed55824f8cb03108b449fbc79fdd39083d
SHA25623db036919cff1e038926d68086beea9d5c14a6b9e9504706a37791ce43fcdb8
SHA512feacd408f9ccab3283933b7600483a3dc1f533c8e181d86c467e267d07db9fb7d60426129480936b10bdb3235d6752f99e7c9eb3a40e78db277e689d80374db5
-
Filesize
200KB
MD53793e2739f0de9dc8ee7b7bb5f65545d
SHA1f4fe26b6f618656fa95438219b68e49a5fa476f4
SHA256df0b0ccde23dce4afa0cd46c7101172764cd979c20f91ede12eff30649aa16c3
SHA512b1cf7be8fb44468746346801f1d957ca67b17ce20e4815c5f2cefc7aaf1914701ef581ce2931bb710972a982446cf825ff0b8a4afc38e293b22925785dd27ee4
-
Filesize
32KB
MD502c64a1386500a910ab7b836e2ba7e2d
SHA10f37a01560159f681cd00f8e7a40fbf8c59c6eef
SHA25687ab75eeef60e1d01bef16a41fd6d4f8bb8defad8615a9943d01b8d935b6e54e
SHA5124230ddf7690541ebc3a1554f1cacc19167235df261723236d7dca19539e5c11e5ffaad88fb8dc9cb63fc7f0f87b8f9f33516ec9b1d4f841fa24f59e825081f99
-
Filesize
21KB
MD525c32f16fc416fb33ce0db91d23a2b50
SHA100cd581f37c5427445f7b5b95f8ffba5a558038c
SHA2566f3b3f992a7877ee57889fd092e7d58c8840fcef8ba08c167f7664995c3d10dd
SHA5126fc402ae076bfe58275bbcc7509baf7559a627850352237521c2f020724f02376357b3d97da17643a451153186074651feca338eae7f9f58c698c31f2c5f9584
-
Filesize
21KB
MD525c32f16fc416fb33ce0db91d23a2b50
SHA100cd581f37c5427445f7b5b95f8ffba5a558038c
SHA2566f3b3f992a7877ee57889fd092e7d58c8840fcef8ba08c167f7664995c3d10dd
SHA5126fc402ae076bfe58275bbcc7509baf7559a627850352237521c2f020724f02376357b3d97da17643a451153186074651feca338eae7f9f58c698c31f2c5f9584
-
Filesize
21KB
MD525c32f16fc416fb33ce0db91d23a2b50
SHA100cd581f37c5427445f7b5b95f8ffba5a558038c
SHA2566f3b3f992a7877ee57889fd092e7d58c8840fcef8ba08c167f7664995c3d10dd
SHA5126fc402ae076bfe58275bbcc7509baf7559a627850352237521c2f020724f02376357b3d97da17643a451153186074651feca338eae7f9f58c698c31f2c5f9584
-
Filesize
188KB
MD5002aaee3c65562e7b9aa42abada9ef83
SHA1ec2855ed55824f8cb03108b449fbc79fdd39083d
SHA25623db036919cff1e038926d68086beea9d5c14a6b9e9504706a37791ce43fcdb8
SHA512feacd408f9ccab3283933b7600483a3dc1f533c8e181d86c467e267d07db9fb7d60426129480936b10bdb3235d6752f99e7c9eb3a40e78db277e689d80374db5
-
Filesize
188KB
MD5002aaee3c65562e7b9aa42abada9ef83
SHA1ec2855ed55824f8cb03108b449fbc79fdd39083d
SHA25623db036919cff1e038926d68086beea9d5c14a6b9e9504706a37791ce43fcdb8
SHA512feacd408f9ccab3283933b7600483a3dc1f533c8e181d86c467e267d07db9fb7d60426129480936b10bdb3235d6752f99e7c9eb3a40e78db277e689d80374db5