Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 19:02

General

  • Target

    c7afe5c89ae9f8e60372cd5c7d50ed1f0700dcf284426eb740d7982fd13484a8.exe

  • Size

    815KB

  • MD5

    3766a64f9e354cb46d33121acafda732

  • SHA1

    8d8cec6a7ce192fb4ef3692b215801c52db5b61b

  • SHA256

    c7afe5c89ae9f8e60372cd5c7d50ed1f0700dcf284426eb740d7982fd13484a8

  • SHA512

    85d15ce494e70daee6e349f950f5c18f7fbb0e860882df4d198347c9375801450e8b7590b000bb1d1e5e0a72a6701eb71e073124d63ca2bcbe69e1eaa2fd1ef1

  • SSDEEP

    12288:3EwIPTZ6eX6DZloK5vP9azwRZYWPC5dO9IpZdj7zSWGPgWaxl9omTLamOAHX:30j2ZloKJQWPUdbSWGPlISmTumOA3

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7afe5c89ae9f8e60372cd5c7d50ed1f0700dcf284426eb740d7982fd13484a8.exe
    "C:\Users\Admin\AppData\Local\Temp\c7afe5c89ae9f8e60372cd5c7d50ed1f0700dcf284426eb740d7982fd13484a8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\11.exe
      "C:\Users\Admin\AppData\Local\Temp\11.exe"
      2⤵
      • UAC bypass
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1716
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\System32\net.exe" stop sharedaccess
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:692
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop sharedaccess
          4⤵
            PID:1464
        • C:\WINDOWS\Lsas.exe
          C:\WINDOWS\Lsas.exe
          3⤵
          • UAC bypass
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1480
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\System32\net.exe" stop sharedaccess
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1684
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop sharedaccess
              5⤵
                PID:1536
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
        1⤵
        • Suspicious use of FindShellTrayWindow
        PID:856

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\11.exe

        Filesize

        76KB

        MD5

        4c142313a0913a5b94ef747c84bae5ad

        SHA1

        8c62f621a90a17701931ff84b93ccbc32664989f

        SHA256

        506f7d4a6c7b0e6bb3330862a285fbcd4ecaab79016b725681cc1ffa7fb4b0cc

        SHA512

        1f596aa8468e1576f9558a0a040dfab84b52a224f94e830b7e029f478d4433362d3c934d253027f60f9703861984b71f36d2b3371e3298d944a181d4c3dee080

      • C:\Users\Admin\AppData\Local\Temp\11.exe

        Filesize

        76KB

        MD5

        4c142313a0913a5b94ef747c84bae5ad

        SHA1

        8c62f621a90a17701931ff84b93ccbc32664989f

        SHA256

        506f7d4a6c7b0e6bb3330862a285fbcd4ecaab79016b725681cc1ffa7fb4b0cc

        SHA512

        1f596aa8468e1576f9558a0a040dfab84b52a224f94e830b7e029f478d4433362d3c934d253027f60f9703861984b71f36d2b3371e3298d944a181d4c3dee080

      • C:\Users\Admin\AppData\Local\Temp\work.jpg

        Filesize

        41KB

        MD5

        b8f86a3c6ee32d56b81be37576397964

        SHA1

        0671b07471998bf8507b92624a449a4364672082

        SHA256

        e17387722f29277130b5c0c136f0030019714642aa53f25cebb374ec74e33654

        SHA512

        f6dffdb9a14fab3bf1596719c65d52f31fdec96a42c93184bea1c0c218eb9cc1838e63b6c54ef8ce71c8e15c7a798ce0599e805bb491d331dc2f4218fc86b9db

      • C:\WINDOWS\Lsas.exe

        Filesize

        76KB

        MD5

        4c142313a0913a5b94ef747c84bae5ad

        SHA1

        8c62f621a90a17701931ff84b93ccbc32664989f

        SHA256

        506f7d4a6c7b0e6bb3330862a285fbcd4ecaab79016b725681cc1ffa7fb4b0cc

        SHA512

        1f596aa8468e1576f9558a0a040dfab84b52a224f94e830b7e029f478d4433362d3c934d253027f60f9703861984b71f36d2b3371e3298d944a181d4c3dee080

      • C:\Windows\Lsas.exe

        Filesize

        76KB

        MD5

        4c142313a0913a5b94ef747c84bae5ad

        SHA1

        8c62f621a90a17701931ff84b93ccbc32664989f

        SHA256

        506f7d4a6c7b0e6bb3330862a285fbcd4ecaab79016b725681cc1ffa7fb4b0cc

        SHA512

        1f596aa8468e1576f9558a0a040dfab84b52a224f94e830b7e029f478d4433362d3c934d253027f60f9703861984b71f36d2b3371e3298d944a181d4c3dee080

      • \Users\Admin\AppData\Local\Temp\11.exe

        Filesize

        76KB

        MD5

        4c142313a0913a5b94ef747c84bae5ad

        SHA1

        8c62f621a90a17701931ff84b93ccbc32664989f

        SHA256

        506f7d4a6c7b0e6bb3330862a285fbcd4ecaab79016b725681cc1ffa7fb4b0cc

        SHA512

        1f596aa8468e1576f9558a0a040dfab84b52a224f94e830b7e029f478d4433362d3c934d253027f60f9703861984b71f36d2b3371e3298d944a181d4c3dee080

      • \Users\Admin\AppData\Local\Temp\11.exe

        Filesize

        76KB

        MD5

        4c142313a0913a5b94ef747c84bae5ad

        SHA1

        8c62f621a90a17701931ff84b93ccbc32664989f

        SHA256

        506f7d4a6c7b0e6bb3330862a285fbcd4ecaab79016b725681cc1ffa7fb4b0cc

        SHA512

        1f596aa8468e1576f9558a0a040dfab84b52a224f94e830b7e029f478d4433362d3c934d253027f60f9703861984b71f36d2b3371e3298d944a181d4c3dee080

      • memory/1480-78-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1716-74-0x0000000000400000-0x0000000000441000-memory.dmp

        Filesize

        260KB

      • memory/1768-54-0x0000000076961000-0x0000000076963000-memory.dmp

        Filesize

        8KB

      • memory/1768-77-0x00000000025A0000-0x00000000025E1000-memory.dmp

        Filesize

        260KB

      • memory/1768-76-0x00000000025A0000-0x00000000025E1000-memory.dmp

        Filesize

        260KB

      • memory/1768-75-0x0000000000400000-0x00000000004CE000-memory.dmp

        Filesize

        824KB