Analysis
-
max time kernel
36s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 12:18
Static task
static1
Behavioral task
behavioral1
Sample
d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe
Resource
win10v2004-20221111-en
General
-
Target
d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe
-
Size
283KB
-
MD5
2efea9596045641712926fe29260bb80
-
SHA1
643f26d24bb53a8975d73b7ba56614eb9bab86e0
-
SHA256
d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4
-
SHA512
84854e8ea56badb6919e6ac829798a6d81da5653ca0714dd95ffd183e8df76972542c7e3097077b313ce7ea5f15533a983c391988a7e6fe0b85b78afa8b15875
-
SSDEEP
6144:vu2urzh9xu/XkauCCE6mm1zt6KoscnB5Aru9vAC68Vu1OQ:vutrzh9xOXkE/m1zEKoscB5Ay9oCM1F
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1472 directx86.exe 1112 directx86.exe -
Loads dropped DLL 3 IoCs
pid Process 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 1472 directx86.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run directx86.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\directx86.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\directx86.exe" directx86.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1472 set thread context of 1112 1472 directx86.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1472 directx86.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1472 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 26 PID 1504 wrote to memory of 1472 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 26 PID 1504 wrote to memory of 1472 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 26 PID 1504 wrote to memory of 1472 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 26 PID 1504 wrote to memory of 1472 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 26 PID 1504 wrote to memory of 1472 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 26 PID 1504 wrote to memory of 1472 1504 d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe 26 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27 PID 1472 wrote to memory of 1112 1472 directx86.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe"C:\Users\Admin\AppData\Local\Temp\d7959c8cb6f50710a5164c32bc34ebff0c5849f716384b5efdaec69d93a114e4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\directx86.exe"C:\Users\Admin\AppData\Local\Temp\directx86.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\directx86.exe"C:\Users\Admin\AppData\Local\Temp\directx86.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1112
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
788KB
MD5ca46170ed65aaad260c6d5f3ac620f81
SHA1975404e16f8d537c97cdb41783bd34da177311c1
SHA2560582a9499ba0a27440d1dd44f99d209c78d0335d1b559b7a2761d1932d9a756b
SHA512120fb157a3a297351acf951b6a5a8a14da77d146582a2ff1606cd9c94a3221a75df3f27a47181244e9c3be952bd7fbc4010ef08f348038002fb41c9a1f3c9d7c
-
Filesize
788KB
MD5ca46170ed65aaad260c6d5f3ac620f81
SHA1975404e16f8d537c97cdb41783bd34da177311c1
SHA2560582a9499ba0a27440d1dd44f99d209c78d0335d1b559b7a2761d1932d9a756b
SHA512120fb157a3a297351acf951b6a5a8a14da77d146582a2ff1606cd9c94a3221a75df3f27a47181244e9c3be952bd7fbc4010ef08f348038002fb41c9a1f3c9d7c
-
Filesize
788KB
MD5ca46170ed65aaad260c6d5f3ac620f81
SHA1975404e16f8d537c97cdb41783bd34da177311c1
SHA2560582a9499ba0a27440d1dd44f99d209c78d0335d1b559b7a2761d1932d9a756b
SHA512120fb157a3a297351acf951b6a5a8a14da77d146582a2ff1606cd9c94a3221a75df3f27a47181244e9c3be952bd7fbc4010ef08f348038002fb41c9a1f3c9d7c
-
Filesize
32B
MD59c251bb52629b2da80ebaa3c62893b28
SHA15cc862d85e9e47216c714b871d5e3d42fd346925
SHA256c673a980644737fba19db26e4216e9965b3db5932ee8f71c9688ca3069ebd073
SHA512f41fbc6cdce9d5697751396ab6af53273d0a50a68331af89cd8275652ef28433341ee54eebeaf31cfb03de6562952b86b1ad70a90c5de8c79510cb1791f111a8
-
Filesize
788KB
MD5ca46170ed65aaad260c6d5f3ac620f81
SHA1975404e16f8d537c97cdb41783bd34da177311c1
SHA2560582a9499ba0a27440d1dd44f99d209c78d0335d1b559b7a2761d1932d9a756b
SHA512120fb157a3a297351acf951b6a5a8a14da77d146582a2ff1606cd9c94a3221a75df3f27a47181244e9c3be952bd7fbc4010ef08f348038002fb41c9a1f3c9d7c
-
Filesize
788KB
MD5ca46170ed65aaad260c6d5f3ac620f81
SHA1975404e16f8d537c97cdb41783bd34da177311c1
SHA2560582a9499ba0a27440d1dd44f99d209c78d0335d1b559b7a2761d1932d9a756b
SHA512120fb157a3a297351acf951b6a5a8a14da77d146582a2ff1606cd9c94a3221a75df3f27a47181244e9c3be952bd7fbc4010ef08f348038002fb41c9a1f3c9d7c
-
Filesize
788KB
MD5ca46170ed65aaad260c6d5f3ac620f81
SHA1975404e16f8d537c97cdb41783bd34da177311c1
SHA2560582a9499ba0a27440d1dd44f99d209c78d0335d1b559b7a2761d1932d9a756b
SHA512120fb157a3a297351acf951b6a5a8a14da77d146582a2ff1606cd9c94a3221a75df3f27a47181244e9c3be952bd7fbc4010ef08f348038002fb41c9a1f3c9d7c