Analysis
-
max time kernel
181s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe
Resource
win10v2004-20221111-en
General
-
Target
c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe
-
Size
264KB
-
MD5
ec6e8bcdb09693d1b3e1ebf903167d53
-
SHA1
04c01d906cd17b76eee88823974891dd85d22836
-
SHA256
c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2
-
SHA512
d2b8715de945fa9dbdd5be89fa1d367c9dcc0eab6bfe595ad118aaf50d8e8827a4091c541675b2e1a5c7176afa927cce62d1267e1f0e4718c67c961bc6342396
-
SSDEEP
6144:oGIqBgwIPbDxXB7y1IFYj0hsEcHxGdAy13Uf84:TBg9j/TsEcHcdAC3Uf84
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 108 ndduser.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RUM2RThCQ0RCMDk2OTNEMU = "C:\\Users\\Admin\\ndduser.exe" ndduser.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ndduser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ndduser.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe 108 ndduser.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1476 c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1476 c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe Token: SeDebugPrivilege 108 ndduser.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1476 wrote to memory of 108 1476 c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe 28 PID 1476 wrote to memory of 108 1476 c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe 28 PID 1476 wrote to memory of 108 1476 c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe 28 PID 1476 wrote to memory of 108 1476 c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe"C:\Users\Admin\AppData\Local\Temp\c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\ndduser.exe"C:\Users\Admin\ndduser.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:108
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5ec6e8bcdb09693d1b3e1ebf903167d53
SHA104c01d906cd17b76eee88823974891dd85d22836
SHA256c2c81e8a3d07ffa15b4f66bbfdf248198b6e6d5147d5f1cc756faba4156a9fc2
SHA512d2b8715de945fa9dbdd5be89fa1d367c9dcc0eab6bfe595ad118aaf50d8e8827a4091c541675b2e1a5c7176afa927cce62d1267e1f0e4718c67c961bc6342396