Analysis
-
max time kernel
152s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe
Resource
win10v2004-20221111-en
General
-
Target
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe
-
Size
305KB
-
MD5
7752189ae3f87ce9a5064c476b76aa1b
-
SHA1
79d0993809f40d2515ee5faa1a0243a1b7caa171
-
SHA256
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324
-
SHA512
f95b190e5f2c3419c87e43dae879f650f0c583fa39919695736df2bd20ca4044b6119ecaa92ee1b544d1caa8b138438ed066a6e277bf6817bbc3664cc3c8dcb4
-
SSDEEP
6144:OZmhgGTPi6goBOU0XuS4rmYtEzKCTZZhWkdLSWDez:Oghgb6gQMlmEzl5WkRSW6z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1688 upqvlod.exe -
Deletes itself 1 IoCs
pid Process 1156 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1156 cmd.exe 1156 cmd.exe 1688 upqvlod.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 944 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 948 PING.EXE -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 944 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe 1688 upqvlod.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1156 2036 cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe 26 PID 2036 wrote to memory of 1156 2036 cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe 26 PID 2036 wrote to memory of 1156 2036 cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe 26 PID 2036 wrote to memory of 1156 2036 cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe 26 PID 1156 wrote to memory of 944 1156 cmd.exe 28 PID 1156 wrote to memory of 944 1156 cmd.exe 28 PID 1156 wrote to memory of 944 1156 cmd.exe 28 PID 1156 wrote to memory of 944 1156 cmd.exe 28 PID 1156 wrote to memory of 948 1156 cmd.exe 30 PID 1156 wrote to memory of 948 1156 cmd.exe 30 PID 1156 wrote to memory of 948 1156 cmd.exe 30 PID 1156 wrote to memory of 948 1156 cmd.exe 30 PID 1156 wrote to memory of 1688 1156 cmd.exe 31 PID 1156 wrote to memory of 1688 1156 cmd.exe 31 PID 1156 wrote to memory of 1688 1156 cmd.exe 31 PID 1156 wrote to memory of 1688 1156 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe"C:\Users\Admin\AppData\Local\Temp\cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2036 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe" & start C:\Users\Admin\AppData\Local\upqvlod.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 20363⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:948
-
-
C:\Users\Admin\AppData\Local\upqvlod.exeC:\Users\Admin\AppData\Local\upqvlod.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1688
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305KB
MD57752189ae3f87ce9a5064c476b76aa1b
SHA179d0993809f40d2515ee5faa1a0243a1b7caa171
SHA256cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324
SHA512f95b190e5f2c3419c87e43dae879f650f0c583fa39919695736df2bd20ca4044b6119ecaa92ee1b544d1caa8b138438ed066a6e277bf6817bbc3664cc3c8dcb4
-
Filesize
305KB
MD57752189ae3f87ce9a5064c476b76aa1b
SHA179d0993809f40d2515ee5faa1a0243a1b7caa171
SHA256cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324
SHA512f95b190e5f2c3419c87e43dae879f650f0c583fa39919695736df2bd20ca4044b6119ecaa92ee1b544d1caa8b138438ed066a6e277bf6817bbc3664cc3c8dcb4
-
Filesize
305KB
MD57752189ae3f87ce9a5064c476b76aa1b
SHA179d0993809f40d2515ee5faa1a0243a1b7caa171
SHA256cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324
SHA512f95b190e5f2c3419c87e43dae879f650f0c583fa39919695736df2bd20ca4044b6119ecaa92ee1b544d1caa8b138438ed066a6e277bf6817bbc3664cc3c8dcb4
-
Filesize
305KB
MD57752189ae3f87ce9a5064c476b76aa1b
SHA179d0993809f40d2515ee5faa1a0243a1b7caa171
SHA256cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324
SHA512f95b190e5f2c3419c87e43dae879f650f0c583fa39919695736df2bd20ca4044b6119ecaa92ee1b544d1caa8b138438ed066a6e277bf6817bbc3664cc3c8dcb4
-
Filesize
305KB
MD57752189ae3f87ce9a5064c476b76aa1b
SHA179d0993809f40d2515ee5faa1a0243a1b7caa171
SHA256cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324
SHA512f95b190e5f2c3419c87e43dae879f650f0c583fa39919695736df2bd20ca4044b6119ecaa92ee1b544d1caa8b138438ed066a6e277bf6817bbc3664cc3c8dcb4