Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe
Resource
win10v2004-20220812-en
General
-
Target
bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe
-
Size
44KB
-
MD5
f324acee017440c3651609875210e63e
-
SHA1
b56a0f5eb61506d304809390ce96f2de997b60a2
-
SHA256
bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a
-
SHA512
88372b79d97e96e74c891607a2376aaba8943fbd145bca1954c824e721ab4fb73f7593a473834d2800f1ec14ee3b0513360eb40ac401764bc3a4380560144be2
-
SSDEEP
768:sOOAFJSQGO+upoVDDvvAXPJPvEuOSx7DPeI:POAF8QzoV3wXRPvEn
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 940 winlogon.exe 1732 winlogon.exe 816 winlogon.exe 1968 winlogon.exe -
resource yara_rule behavioral1/memory/2032-55-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2032-57-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2032-58-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2032-61-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2032-62-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2032-70-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1732-85-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1732-93-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 2032 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 2032 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 784 set thread context of 2032 784 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 26 PID 940 set thread context of 1732 940 winlogon.exe 28 PID 1732 set thread context of 816 1732 winlogon.exe 31 PID 1732 set thread context of 1968 1732 winlogon.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2032 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 1732 winlogon.exe 816 winlogon.exe 1968 winlogon.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 784 wrote to memory of 2032 784 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 26 PID 784 wrote to memory of 2032 784 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 26 PID 784 wrote to memory of 2032 784 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 26 PID 784 wrote to memory of 2032 784 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 26 PID 784 wrote to memory of 2032 784 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 26 PID 784 wrote to memory of 2032 784 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 26 PID 784 wrote to memory of 2032 784 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 26 PID 2032 wrote to memory of 940 2032 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 27 PID 2032 wrote to memory of 940 2032 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 27 PID 2032 wrote to memory of 940 2032 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 27 PID 2032 wrote to memory of 940 2032 bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe 27 PID 940 wrote to memory of 1732 940 winlogon.exe 28 PID 940 wrote to memory of 1732 940 winlogon.exe 28 PID 940 wrote to memory of 1732 940 winlogon.exe 28 PID 940 wrote to memory of 1732 940 winlogon.exe 28 PID 940 wrote to memory of 1732 940 winlogon.exe 28 PID 940 wrote to memory of 1732 940 winlogon.exe 28 PID 940 wrote to memory of 1732 940 winlogon.exe 28 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 816 1732 winlogon.exe 31 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32 PID 1732 wrote to memory of 1968 1732 winlogon.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe"C:\Users\Admin\AppData\Local\Temp\bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exeC:\Users\Admin\AppData\Local\Temp\bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a.exe2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\E696D64614\winlogon.exeC:\Users\Admin\E696D64614\winlogon.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:816
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5f324acee017440c3651609875210e63e
SHA1b56a0f5eb61506d304809390ce96f2de997b60a2
SHA256bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a
SHA51288372b79d97e96e74c891607a2376aaba8943fbd145bca1954c824e721ab4fb73f7593a473834d2800f1ec14ee3b0513360eb40ac401764bc3a4380560144be2
-
Filesize
44KB
MD5f324acee017440c3651609875210e63e
SHA1b56a0f5eb61506d304809390ce96f2de997b60a2
SHA256bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a
SHA51288372b79d97e96e74c891607a2376aaba8943fbd145bca1954c824e721ab4fb73f7593a473834d2800f1ec14ee3b0513360eb40ac401764bc3a4380560144be2
-
Filesize
44KB
MD5f324acee017440c3651609875210e63e
SHA1b56a0f5eb61506d304809390ce96f2de997b60a2
SHA256bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a
SHA51288372b79d97e96e74c891607a2376aaba8943fbd145bca1954c824e721ab4fb73f7593a473834d2800f1ec14ee3b0513360eb40ac401764bc3a4380560144be2
-
Filesize
44KB
MD5f324acee017440c3651609875210e63e
SHA1b56a0f5eb61506d304809390ce96f2de997b60a2
SHA256bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a
SHA51288372b79d97e96e74c891607a2376aaba8943fbd145bca1954c824e721ab4fb73f7593a473834d2800f1ec14ee3b0513360eb40ac401764bc3a4380560144be2
-
Filesize
44KB
MD5f324acee017440c3651609875210e63e
SHA1b56a0f5eb61506d304809390ce96f2de997b60a2
SHA256bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a
SHA51288372b79d97e96e74c891607a2376aaba8943fbd145bca1954c824e721ab4fb73f7593a473834d2800f1ec14ee3b0513360eb40ac401764bc3a4380560144be2
-
Filesize
44KB
MD5f324acee017440c3651609875210e63e
SHA1b56a0f5eb61506d304809390ce96f2de997b60a2
SHA256bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a
SHA51288372b79d97e96e74c891607a2376aaba8943fbd145bca1954c824e721ab4fb73f7593a473834d2800f1ec14ee3b0513360eb40ac401764bc3a4380560144be2
-
Filesize
44KB
MD5f324acee017440c3651609875210e63e
SHA1b56a0f5eb61506d304809390ce96f2de997b60a2
SHA256bd07d46f522904a5af306afbffd9e95aafa87ff74f8c04343bc8ff51efc4b41a
SHA51288372b79d97e96e74c891607a2376aaba8943fbd145bca1954c824e721ab4fb73f7593a473834d2800f1ec14ee3b0513360eb40ac401764bc3a4380560144be2