Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe
Resource
win10v2004-20221111-en
General
-
Target
6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe
-
Size
43KB
-
MD5
08b39e6116973f2b28df5ba7f2c85120
-
SHA1
dccb9a1dcbe01cb2a7896d9f96643ab9f2b21a8a
-
SHA256
6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d
-
SHA512
fc8081723f30a4b8296f8452225b8814e43bcdc82ef5e51adf3224cf90e75d609fa987f7c9fa762a6177710f0d2e1e123cbee9700250233251a03e0fe1ed868a
-
SSDEEP
768:XTGrDP7R8yVEP/Sy6Iv6re9WTZ2qd581l6HzjHPqqvtK1ADML1syXD8NhyH8YwHw:m6WEpgfNWlD8DHCCrk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1204 Trojan.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1544 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe Trojan.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5cd8f17f4086744065eb0992a09e05a2.exe Trojan.exe -
Loads dropped DLL 1 IoCs
pid Process 1268 6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\5cd8f17f4086744065eb0992a09e05a2 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Trojan.exe\" .." Trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1204 Trojan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1204 Trojan.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1204 1268 6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe 27 PID 1268 wrote to memory of 1204 1268 6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe 27 PID 1268 wrote to memory of 1204 1268 6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe 27 PID 1268 wrote to memory of 1204 1268 6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe 27 PID 1204 wrote to memory of 1544 1204 Trojan.exe 28 PID 1204 wrote to memory of 1544 1204 Trojan.exe 28 PID 1204 wrote to memory of 1544 1204 Trojan.exe 28 PID 1204 wrote to memory of 1544 1204 Trojan.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe"C:\Users\Admin\AppData\Local\Temp\6107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1544
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD508b39e6116973f2b28df5ba7f2c85120
SHA1dccb9a1dcbe01cb2a7896d9f96643ab9f2b21a8a
SHA2566107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d
SHA512fc8081723f30a4b8296f8452225b8814e43bcdc82ef5e51adf3224cf90e75d609fa987f7c9fa762a6177710f0d2e1e123cbee9700250233251a03e0fe1ed868a
-
Filesize
43KB
MD508b39e6116973f2b28df5ba7f2c85120
SHA1dccb9a1dcbe01cb2a7896d9f96643ab9f2b21a8a
SHA2566107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d
SHA512fc8081723f30a4b8296f8452225b8814e43bcdc82ef5e51adf3224cf90e75d609fa987f7c9fa762a6177710f0d2e1e123cbee9700250233251a03e0fe1ed868a
-
Filesize
43KB
MD508b39e6116973f2b28df5ba7f2c85120
SHA1dccb9a1dcbe01cb2a7896d9f96643ab9f2b21a8a
SHA2566107322118bfc89b982d9064d5e500b45f10bebd297d997a38c4d464bbd1945d
SHA512fc8081723f30a4b8296f8452225b8814e43bcdc82ef5e51adf3224cf90e75d609fa987f7c9fa762a6177710f0d2e1e123cbee9700250233251a03e0fe1ed868a