Analysis
-
max time kernel
286s -
max time network
384s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:18
Behavioral task
behavioral1
Sample
1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe
Resource
win10v2004-20221111-en
General
-
Target
1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe
-
Size
525KB
-
MD5
0c08ae9498627dd8f85286901876a1a3
-
SHA1
9abfc57850b57259b24c107b287deb91f1e38b40
-
SHA256
1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439
-
SHA512
79556bb8f04a202ad280c4fe0028158e5eee4c276c14a99b6b232aee30fd58c577e6945bc590961903bbbb016d5bf3d64398b84aaaebe01f22ae7f82c200b1b6
-
SSDEEP
6144:KYjrEXNj3u7e4Rp9s6HYtVLCfOrpwbcG6perQE5pVuaGvX9WD9MD4t58TT4slcpx:jjQXUe4RHHYtEfwC5TPW4g42QjZ
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0008000000012731-79.dat aspack_v212_v242 behavioral1/files/0x0008000000012731-80.dat aspack_v212_v242 behavioral1/files/0x0008000000012731-81.dat aspack_v212_v242 behavioral1/files/0x0008000000012731-83.dat aspack_v212_v242 behavioral1/files/0x0008000000012731-87.dat aspack_v212_v242 behavioral1/files/0x0008000000012731-106.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 1616 SearchIndexer.exe 1608 SearchIndexer.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SearchIndexer.lnk 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe -
Loads dropped DLL 3 IoCs
pid Process 996 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 996 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 996 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 852 set thread context of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 1616 set thread context of 1608 1616 SearchIndexer.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 996 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 852 wrote to memory of 996 852 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 28 PID 996 wrote to memory of 1616 996 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 29 PID 996 wrote to memory of 1616 996 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 29 PID 996 wrote to memory of 1616 996 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 29 PID 996 wrote to memory of 1616 996 1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe 29 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30 PID 1616 wrote to memory of 1608 1616 SearchIndexer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe"C:\Users\Admin\AppData\Local\Temp\1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exeC:\Users\Admin\AppData\Local\Temp\1b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439.exe2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Reference Assemblies\SearchIndexer.exe-fst3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Reference Assemblies\SearchIndexer.exe"C:\Users\Admin\AppData\Local\Reference Assemblies\SearchIndexer.exe"4⤵
- Executes dropped EXE
PID:1608
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD50c08ae9498627dd8f85286901876a1a3
SHA19abfc57850b57259b24c107b287deb91f1e38b40
SHA2561b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439
SHA51279556bb8f04a202ad280c4fe0028158e5eee4c276c14a99b6b232aee30fd58c577e6945bc590961903bbbb016d5bf3d64398b84aaaebe01f22ae7f82c200b1b6
-
Filesize
525KB
MD50c08ae9498627dd8f85286901876a1a3
SHA19abfc57850b57259b24c107b287deb91f1e38b40
SHA2561b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439
SHA51279556bb8f04a202ad280c4fe0028158e5eee4c276c14a99b6b232aee30fd58c577e6945bc590961903bbbb016d5bf3d64398b84aaaebe01f22ae7f82c200b1b6
-
Filesize
525KB
MD50c08ae9498627dd8f85286901876a1a3
SHA19abfc57850b57259b24c107b287deb91f1e38b40
SHA2561b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439
SHA51279556bb8f04a202ad280c4fe0028158e5eee4c276c14a99b6b232aee30fd58c577e6945bc590961903bbbb016d5bf3d64398b84aaaebe01f22ae7f82c200b1b6
-
Filesize
525KB
MD50c08ae9498627dd8f85286901876a1a3
SHA19abfc57850b57259b24c107b287deb91f1e38b40
SHA2561b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439
SHA51279556bb8f04a202ad280c4fe0028158e5eee4c276c14a99b6b232aee30fd58c577e6945bc590961903bbbb016d5bf3d64398b84aaaebe01f22ae7f82c200b1b6
-
Filesize
525KB
MD50c08ae9498627dd8f85286901876a1a3
SHA19abfc57850b57259b24c107b287deb91f1e38b40
SHA2561b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439
SHA51279556bb8f04a202ad280c4fe0028158e5eee4c276c14a99b6b232aee30fd58c577e6945bc590961903bbbb016d5bf3d64398b84aaaebe01f22ae7f82c200b1b6
-
Filesize
525KB
MD50c08ae9498627dd8f85286901876a1a3
SHA19abfc57850b57259b24c107b287deb91f1e38b40
SHA2561b3cf050d626706d32c1c2c1cbd4975d519cfbdb9bca0f2e66b7e1120030b439
SHA51279556bb8f04a202ad280c4fe0028158e5eee4c276c14a99b6b232aee30fd58c577e6945bc590961903bbbb016d5bf3d64398b84aaaebe01f22ae7f82c200b1b6