Analysis
-
max time kernel
148s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 11:23
Static task
static1
Behavioral task
behavioral1
Sample
f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe
Resource
win10v2004-20221111-en
General
-
Target
f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe
-
Size
173KB
-
MD5
3feb88a38d7e8692436aced0fbc5e798
-
SHA1
e86aabad1cd6539e2e0cba7b4ae07d5b33fbde7f
-
SHA256
f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad
-
SHA512
e860a1052ebe3af9edb309bd303066de4ab77e116b6b81fd142e903a404ce77122453189acedc0008ded3640be570125833ed6e67673888bc7a2cd247d67facc
-
SSDEEP
3072:CdclVo8bVCsZRb4k6m92rtby1l08ndSQGP:dnpR1X+tbyI8ndS
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 1184 regedit.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 960 wrote to memory of 904 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 28 PID 960 wrote to memory of 904 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 28 PID 960 wrote to memory of 904 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 28 PID 960 wrote to memory of 904 960 f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe 28 PID 904 wrote to memory of 1184 904 regedt32.exe 29 PID 904 wrote to memory of 1184 904 regedt32.exe 29 PID 904 wrote to memory of 1184 904 regedt32.exe 29 PID 904 wrote to memory of 1184 904 regedt32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe"C:\Users\Admin\AppData\Local\Temp\f1a0b722f22d7bc45a48c1a33ff07adaf1143ea382f6125062fd560bdede74ad.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\regedt32.exe"C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"3⤵
- Runs .reg file with regedit
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD58b5089251b1d4e6526987132f670ee69
SHA1722088df8776176fd3fd91dab0e92535fee5198c
SHA2569bdf5df802c45856bbabe8262a43fd251124bdb400108f01b271632a168b8fa7
SHA512af3651bc21f960ab0f71377f9a957e990dde3680ff56780c539f83692f77922d1c3f5894af9dde3ddde45944d2ad253a752035c3f17e598f28bb2f9e92c09280
-
Filesize
41KB
MD5138d049f208cafba11ce647464a74c83
SHA18b9c26a5dd9fdc8d8d376d1ef6fe62876068c657
SHA25688b5c70fbc4dc678e4602a1427aa59951676402034ceff683fdf3d5aaa13780c
SHA5126464d7735baf6a3a7516237a76bb532ec5aba4acbc17f5976f1d43e183ed63a99337505388e48c2cf679ec0b1aaf44acde1cf9bfb2bf0d5d22761215480d81c4