Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 18:04
Static task
static1
Behavioral task
behavioral1
Sample
e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe
Resource
win10v2004-20220901-en
General
-
Target
e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe
-
Size
36KB
-
MD5
a9d3ab40148aa74e1013e01de78a688d
-
SHA1
7a20322cd61c2901dea98cf5340a42d1af4b6394
-
SHA256
e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea
-
SHA512
a68e7e27f3f31f83cfa9e2f75a101e57bfaec5406828b0a4ed69d0b114fea639432e3cb041f8ac80e3d6f7e38e76479b53f1273d1dcf8307127effeb311a0f10
-
SSDEEP
384:Db4pRL/W7hiQMB1BYzhyqaORdnZbPgv1:f4pRbW7EQMahyq3Pgv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1160 winlogon.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\winlogon.exe e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe File created C:\Windows\winlogon.exe winlogon.exe File created C:\Windows\winlogon.exe e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe 1160 winlogon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1492 e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe 1492 e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe 1160 winlogon.exe 1160 winlogon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1160 1492 e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe 27 PID 1492 wrote to memory of 1160 1492 e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe 27 PID 1492 wrote to memory of 1160 1492 e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe 27 PID 1492 wrote to memory of 1160 1492 e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe"C:\Users\Admin\AppData\Local\Temp\e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\winlogon.exe"C:\Windows\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5a9d3ab40148aa74e1013e01de78a688d
SHA17a20322cd61c2901dea98cf5340a42d1af4b6394
SHA256e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea
SHA512a68e7e27f3f31f83cfa9e2f75a101e57bfaec5406828b0a4ed69d0b114fea639432e3cb041f8ac80e3d6f7e38e76479b53f1273d1dcf8307127effeb311a0f10
-
Filesize
36KB
MD5a9d3ab40148aa74e1013e01de78a688d
SHA17a20322cd61c2901dea98cf5340a42d1af4b6394
SHA256e6877ebc1d433bd7573e8e38f23054c98ea7f7c5a2deed9d968d0d5140c9eeea
SHA512a68e7e27f3f31f83cfa9e2f75a101e57bfaec5406828b0a4ed69d0b114fea639432e3cb041f8ac80e3d6f7e38e76479b53f1273d1dcf8307127effeb311a0f10