Analysis
-
max time kernel
129s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe
Resource
win10v2004-20220901-en
General
-
Target
847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe
-
Size
878KB
-
MD5
6eb796dff32db9ecc27de7d11e2a0b9b
-
SHA1
382bd667254ea0f388492df58b5c09746aa48adc
-
SHA256
847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844
-
SHA512
563bb538f73de9d46d162960b4e74dc4735708f7e977f68d11fa65f2a4fbec6e76b3d52def5a9c02de5e47096aad9e11aa0f39e48693b3024062b2e2585df036
-
SSDEEP
12288:545lsk3cppypFgcBcF6gUmbMrWEBD24uX0gAb+yKI09ZgP5qEsPtRac5Mbk2hEV+:5454ppE7MICQMX0gskCvWzac8lhEV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 656 50539545.exe -
Deletes itself 1 IoCs
pid Process 752 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 752 cmd.exe 752 cmd.exe 656 50539545.exe 656 50539545.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844 = "\"C:\\Users\\Admin\\AppData\\Local\\50539545.exe\" 0 33 " 847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 50539545.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\50539545 = "\"C:\\Users\\Admin\\AppData\\Local\\50539545.exe\" 0 25 " 50539545.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 432 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 656 50539545.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 656 50539545.exe 656 50539545.exe 656 50539545.exe 656 50539545.exe 656 50539545.exe 656 50539545.exe 656 50539545.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 656 50539545.exe 656 50539545.exe 656 50539545.exe 656 50539545.exe 656 50539545.exe 656 50539545.exe 656 50539545.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1776 wrote to memory of 752 1776 847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe 28 PID 1776 wrote to memory of 752 1776 847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe 28 PID 1776 wrote to memory of 752 1776 847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe 28 PID 1776 wrote to memory of 752 1776 847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe 28 PID 752 wrote to memory of 432 752 cmd.exe 30 PID 752 wrote to memory of 432 752 cmd.exe 30 PID 752 wrote to memory of 432 752 cmd.exe 30 PID 752 wrote to memory of 432 752 cmd.exe 30 PID 752 wrote to memory of 656 752 cmd.exe 31 PID 752 wrote to memory of 656 752 cmd.exe 31 PID 752 wrote to memory of 656 752 cmd.exe 31 PID 752 wrote to memory of 656 752 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe"C:\Users\Admin\AppData\Local\Temp\847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\87336145.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844 /f3⤵
- Modifies registry key
PID:432
-
-
C:\Users\Admin\AppData\Local\50539545.exeC:\Users\Admin\AppData\Local\50539545.exe -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:656
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
878KB
MD56eb796dff32db9ecc27de7d11e2a0b9b
SHA1382bd667254ea0f388492df58b5c09746aa48adc
SHA256847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844
SHA512563bb538f73de9d46d162960b4e74dc4735708f7e977f68d11fa65f2a4fbec6e76b3d52def5a9c02de5e47096aad9e11aa0f39e48693b3024062b2e2585df036
-
Filesize
878KB
MD56eb796dff32db9ecc27de7d11e2a0b9b
SHA1382bd667254ea0f388492df58b5c09746aa48adc
SHA256847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844
SHA512563bb538f73de9d46d162960b4e74dc4735708f7e977f68d11fa65f2a4fbec6e76b3d52def5a9c02de5e47096aad9e11aa0f39e48693b3024062b2e2585df036
-
Filesize
458B
MD593b14f8f3b148fe029f3e5e6f7aad28d
SHA1bd2785945f42db476a3960b9cda66aa89c8c8860
SHA25645744c44f32fb1801a42c7dc77430d1f9df84607b5f30e8400fc931147bbfa45
SHA5126e489303821c67d7775dedc036140ada4294c848ab0a5dafac5bea2f61d4823bb1d521b45b896162de50b66fd450c6925dd699b2f7c0ad49a086f993cb175889
-
Filesize
878KB
MD56eb796dff32db9ecc27de7d11e2a0b9b
SHA1382bd667254ea0f388492df58b5c09746aa48adc
SHA256847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844
SHA512563bb538f73de9d46d162960b4e74dc4735708f7e977f68d11fa65f2a4fbec6e76b3d52def5a9c02de5e47096aad9e11aa0f39e48693b3024062b2e2585df036
-
Filesize
878KB
MD56eb796dff32db9ecc27de7d11e2a0b9b
SHA1382bd667254ea0f388492df58b5c09746aa48adc
SHA256847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844
SHA512563bb538f73de9d46d162960b4e74dc4735708f7e977f68d11fa65f2a4fbec6e76b3d52def5a9c02de5e47096aad9e11aa0f39e48693b3024062b2e2585df036
-
Filesize
878KB
MD56eb796dff32db9ecc27de7d11e2a0b9b
SHA1382bd667254ea0f388492df58b5c09746aa48adc
SHA256847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844
SHA512563bb538f73de9d46d162960b4e74dc4735708f7e977f68d11fa65f2a4fbec6e76b3d52def5a9c02de5e47096aad9e11aa0f39e48693b3024062b2e2585df036
-
Filesize
878KB
MD56eb796dff32db9ecc27de7d11e2a0b9b
SHA1382bd667254ea0f388492df58b5c09746aa48adc
SHA256847350d19a2aff63910b41755ab2efc6b503a79f49939535de78fd9e2b987844
SHA512563bb538f73de9d46d162960b4e74dc4735708f7e977f68d11fa65f2a4fbec6e76b3d52def5a9c02de5e47096aad9e11aa0f39e48693b3024062b2e2585df036