Analysis
-
max time kernel
151s -
max time network
389s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe
Resource
win10v2004-20221111-en
General
-
Target
d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe
-
Size
837KB
-
MD5
45ba505205cc7d1d9e331ce88d5b27dd
-
SHA1
e53d1804b55c6f14112947bbfde2d8893cfd38ce
-
SHA256
d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891
-
SHA512
171fc53c3f3beaf880dad9f285aa5a8e94ce4ef60f14a266194fbc3e178cf785d0f7e17c1550fa5a637ddca49a703a9d5246ad80c283753b6a210a38b7f6f86f
-
SSDEEP
24576:1HzKsfETSDBqKrYX59HhlmeAJdE9oIwXaClqD:5zKsMxl5jgerobbA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3020 isecurity.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run isecurity.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\Q: isecurity.exe File opened (read-only) \??\F: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\V: isecurity.exe File opened (read-only) \??\W: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\Y: isecurity.exe File opened (read-only) \??\E: isecurity.exe File opened (read-only) \??\L: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\Z: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 8 IoCs
pid pid_target Process procid_target 3456 3020 WerFault.exe 83 364 3020 WerFault.exe 83 2184 3020 WerFault.exe 83 3208 3020 WerFault.exe 83 3812 3020 WerFault.exe 83 4284 3020 WerFault.exe 83 3580 3020 WerFault.exe 83 4412 3020 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1680 d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe 1680 d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1680 d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3020 isecurity.exe 3020 isecurity.exe 3020 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3020 isecurity.exe 3020 isecurity.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 3020 1680 d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe 83 PID 1680 wrote to memory of 3020 1680 d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe 83 PID 1680 wrote to memory of 3020 1680 d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe"C:\Users\Admin\AppData\Local\Temp\d73f035c914e2b26fe5a902bcb2f167416496a2a3af88f92cac4060763c45891.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 8803⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 11803⤵
- Program crash
PID:364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 12003⤵
- Program crash
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 12323⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 12403⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 12843⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 12843⤵
- Program crash
PID:3580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 12843⤵
- Program crash
PID:4412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3020 -ip 30201⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3020 -ip 30201⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3020 -ip 30201⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3020 -ip 30201⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3020 -ip 30201⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3020 -ip 30201⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3020 -ip 30201⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3020 -ip 30201⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3020 -ip 30201⤵PID:380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD56f8a8589dfdca9a93c83771eef0025d0
SHA1a06fb37488361f8d70303390d4567018c60623fb
SHA25612ba3a50481a7a383a920e07eaf69f7348d304c51beb8617c1e6d1f3382a0bcc
SHA5120c1d8e19052a03828d09354ed7bacf6b9dfd2cc7bc073cf18b2090096a0807791d31d7b790a667fc61d544de4032c340f91fd2f8a712c1b2b29663e9a1e0257b
-
Filesize
828KB
MD56f8a8589dfdca9a93c83771eef0025d0
SHA1a06fb37488361f8d70303390d4567018c60623fb
SHA25612ba3a50481a7a383a920e07eaf69f7348d304c51beb8617c1e6d1f3382a0bcc
SHA5120c1d8e19052a03828d09354ed7bacf6b9dfd2cc7bc073cf18b2090096a0807791d31d7b790a667fc61d544de4032c340f91fd2f8a712c1b2b29663e9a1e0257b