Analysis
-
max time kernel
249s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
Newsoftwares.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Newsoftwares.exe
Resource
win10v2004-20221111-en
General
-
Target
Newsoftwares.exe
-
Size
288KB
-
MD5
8e5e52ace73fd6c9f16f23995b7cbf30
-
SHA1
1ceec3bf8cd3a972d2e98831f82d18ee8f2680f5
-
SHA256
5956b0ca0409dfa17ddc355eb11f1f931a9a3f6fbd5bade5e38f35be6bbdc3a9
-
SHA512
fb39546ff134d92083256f176d7187fd056f065607ecd9024dabcdb6c21b1b66db2665136db3a7b2f8301fde98307070d222dabc53449e4a7bba7bfa287fcf7f
-
SSDEEP
6144:FFJ0PLFzx6zl/zSOyMmouBWL6qzw/hmvDwrW+MVwJ:whYx9vmoZL6qzw/hADW7yI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 568 beffabfhed.exe -
Loads dropped DLL 5 IoCs
pid Process 268 Newsoftwares.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1728 568 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1168 wmic.exe Token: SeSecurityPrivilege 1168 wmic.exe Token: SeTakeOwnershipPrivilege 1168 wmic.exe Token: SeLoadDriverPrivilege 1168 wmic.exe Token: SeSystemProfilePrivilege 1168 wmic.exe Token: SeSystemtimePrivilege 1168 wmic.exe Token: SeProfSingleProcessPrivilege 1168 wmic.exe Token: SeIncBasePriorityPrivilege 1168 wmic.exe Token: SeCreatePagefilePrivilege 1168 wmic.exe Token: SeBackupPrivilege 1168 wmic.exe Token: SeRestorePrivilege 1168 wmic.exe Token: SeShutdownPrivilege 1168 wmic.exe Token: SeDebugPrivilege 1168 wmic.exe Token: SeSystemEnvironmentPrivilege 1168 wmic.exe Token: SeRemoteShutdownPrivilege 1168 wmic.exe Token: SeUndockPrivilege 1168 wmic.exe Token: SeManageVolumePrivilege 1168 wmic.exe Token: 33 1168 wmic.exe Token: 34 1168 wmic.exe Token: 35 1168 wmic.exe Token: SeIncreaseQuotaPrivilege 1168 wmic.exe Token: SeSecurityPrivilege 1168 wmic.exe Token: SeTakeOwnershipPrivilege 1168 wmic.exe Token: SeLoadDriverPrivilege 1168 wmic.exe Token: SeSystemProfilePrivilege 1168 wmic.exe Token: SeSystemtimePrivilege 1168 wmic.exe Token: SeProfSingleProcessPrivilege 1168 wmic.exe Token: SeIncBasePriorityPrivilege 1168 wmic.exe Token: SeCreatePagefilePrivilege 1168 wmic.exe Token: SeBackupPrivilege 1168 wmic.exe Token: SeRestorePrivilege 1168 wmic.exe Token: SeShutdownPrivilege 1168 wmic.exe Token: SeDebugPrivilege 1168 wmic.exe Token: SeSystemEnvironmentPrivilege 1168 wmic.exe Token: SeRemoteShutdownPrivilege 1168 wmic.exe Token: SeUndockPrivilege 1168 wmic.exe Token: SeManageVolumePrivilege 1168 wmic.exe Token: 33 1168 wmic.exe Token: 34 1168 wmic.exe Token: 35 1168 wmic.exe Token: SeIncreaseQuotaPrivilege 1112 wmic.exe Token: SeSecurityPrivilege 1112 wmic.exe Token: SeTakeOwnershipPrivilege 1112 wmic.exe Token: SeLoadDriverPrivilege 1112 wmic.exe Token: SeSystemProfilePrivilege 1112 wmic.exe Token: SeSystemtimePrivilege 1112 wmic.exe Token: SeProfSingleProcessPrivilege 1112 wmic.exe Token: SeIncBasePriorityPrivilege 1112 wmic.exe Token: SeCreatePagefilePrivilege 1112 wmic.exe Token: SeBackupPrivilege 1112 wmic.exe Token: SeRestorePrivilege 1112 wmic.exe Token: SeShutdownPrivilege 1112 wmic.exe Token: SeDebugPrivilege 1112 wmic.exe Token: SeSystemEnvironmentPrivilege 1112 wmic.exe Token: SeRemoteShutdownPrivilege 1112 wmic.exe Token: SeUndockPrivilege 1112 wmic.exe Token: SeManageVolumePrivilege 1112 wmic.exe Token: 33 1112 wmic.exe Token: 34 1112 wmic.exe Token: 35 1112 wmic.exe Token: SeIncreaseQuotaPrivilege 1112 wmic.exe Token: SeSecurityPrivilege 1112 wmic.exe Token: SeTakeOwnershipPrivilege 1112 wmic.exe Token: SeLoadDriverPrivilege 1112 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 268 wrote to memory of 568 268 Newsoftwares.exe 28 PID 268 wrote to memory of 568 268 Newsoftwares.exe 28 PID 268 wrote to memory of 568 268 Newsoftwares.exe 28 PID 268 wrote to memory of 568 268 Newsoftwares.exe 28 PID 568 wrote to memory of 1168 568 beffabfhed.exe 29 PID 568 wrote to memory of 1168 568 beffabfhed.exe 29 PID 568 wrote to memory of 1168 568 beffabfhed.exe 29 PID 568 wrote to memory of 1168 568 beffabfhed.exe 29 PID 568 wrote to memory of 1112 568 beffabfhed.exe 32 PID 568 wrote to memory of 1112 568 beffabfhed.exe 32 PID 568 wrote to memory of 1112 568 beffabfhed.exe 32 PID 568 wrote to memory of 1112 568 beffabfhed.exe 32 PID 568 wrote to memory of 1924 568 beffabfhed.exe 34 PID 568 wrote to memory of 1924 568 beffabfhed.exe 34 PID 568 wrote to memory of 1924 568 beffabfhed.exe 34 PID 568 wrote to memory of 1924 568 beffabfhed.exe 34 PID 568 wrote to memory of 1216 568 beffabfhed.exe 36 PID 568 wrote to memory of 1216 568 beffabfhed.exe 36 PID 568 wrote to memory of 1216 568 beffabfhed.exe 36 PID 568 wrote to memory of 1216 568 beffabfhed.exe 36 PID 568 wrote to memory of 1392 568 beffabfhed.exe 38 PID 568 wrote to memory of 1392 568 beffabfhed.exe 38 PID 568 wrote to memory of 1392 568 beffabfhed.exe 38 PID 568 wrote to memory of 1392 568 beffabfhed.exe 38 PID 568 wrote to memory of 1728 568 beffabfhed.exe 40 PID 568 wrote to memory of 1728 568 beffabfhed.exe 40 PID 568 wrote to memory of 1728 568 beffabfhed.exe 40 PID 568 wrote to memory of 1728 568 beffabfhed.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\Newsoftwares.exe"C:\Users\Admin\AppData\Local\Temp\Newsoftwares.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\beffabfhed.exeC:\Users\Admin\AppData\Local\Temp\beffabfhed.exe 1)1)6)6)9)5)8)2)7)7)1 Lk9DPjQsMTYtKx8uUk88R0Q8OykZLk1ETlFGTUNHPTYwHy4+Q0pPQUI2Kzg1LzMaJj5BQjYpHy5PTEk7UDtSWEJDPDEyMi0vGC1MPlFVRExZTE1EO2Ftc285KSlqbW4sPT5SSixOSUcoOU5JJ0hNRUkaJj5ERzxESEM8Gik7LDUrKhkuQzE3JygbJ0IsNiwwHyk+KzglLxkoQzQ8JysXKkhQSD1UQlNZSklETj88UjwfLkpMRj9NQU1YRFRLOzcXKkhQSD1UQlNZSDhIPTtIbWdkcRopPFM9XU5LSzwfKT9PQFdBRj1LSE0/NxcqQE1MTV5BUUlRSkBKOy4ZLlNHO0hCVEdTWE5RSzwaKU1INTAZKENSMDcaJk1NTE1CTEReUT9DPkdLPkJMQEY/T0lHNR4oQlJeUU9IS0RFQzZtcXRkGilJQExTS0dITUZZT0pASl09OlhSPCwaJkNBQj5RPDAfKUNKWjxXRzpMSEJZP0U+SldJTURDPGBbY25dHig9TlZNRkk4P1dHSTYxLzcoKygrJjcsJzAxMRopRzxKP0VFREteQ0hKTzlKRTZzcXRfGiZPQUs+NjAzNDAzMDIqLywZLkNOUUhDSjlCWE1ITEQ3LSYuJzApKjUpODQsLTUtMSM6TA==2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81670423944.txt bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81670423944.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81670423944.txt bios get version3⤵PID:1924
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81670423944.txt bios get version3⤵PID:1216
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81670423944.txt bios get version3⤵PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 3723⤵
- Loads dropped DLL
- Program crash
PID:1728
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
58B
MD5dd876faf0fd44a5fab3e82368e2e8b15
SHA101b04083fa278dda3a81705ca5abcfee487a3c90
SHA2565602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9
SHA512e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b
-
Filesize
569KB
MD5b193af3d0371b5f27523ab5a836ada96
SHA1073907e2dd63de28c4cadc9db94450a5648eea73
SHA25629ae9d682ff68d8498a0df37dd1f5dc4dc23879dda47f29f491d4a53890b3321
SHA512fa95dbde32691ad06e72fa2020382dea651a23a5caec66fabac3e847e9bafb0e8b9b5bbce708cfb89cf24403f64190328d9b2dee398e3bab0aeb0366513ff159
-
Filesize
569KB
MD5b193af3d0371b5f27523ab5a836ada96
SHA1073907e2dd63de28c4cadc9db94450a5648eea73
SHA25629ae9d682ff68d8498a0df37dd1f5dc4dc23879dda47f29f491d4a53890b3321
SHA512fa95dbde32691ad06e72fa2020382dea651a23a5caec66fabac3e847e9bafb0e8b9b5bbce708cfb89cf24403f64190328d9b2dee398e3bab0aeb0366513ff159
-
Filesize
569KB
MD5b193af3d0371b5f27523ab5a836ada96
SHA1073907e2dd63de28c4cadc9db94450a5648eea73
SHA25629ae9d682ff68d8498a0df37dd1f5dc4dc23879dda47f29f491d4a53890b3321
SHA512fa95dbde32691ad06e72fa2020382dea651a23a5caec66fabac3e847e9bafb0e8b9b5bbce708cfb89cf24403f64190328d9b2dee398e3bab0aeb0366513ff159
-
Filesize
569KB
MD5b193af3d0371b5f27523ab5a836ada96
SHA1073907e2dd63de28c4cadc9db94450a5648eea73
SHA25629ae9d682ff68d8498a0df37dd1f5dc4dc23879dda47f29f491d4a53890b3321
SHA512fa95dbde32691ad06e72fa2020382dea651a23a5caec66fabac3e847e9bafb0e8b9b5bbce708cfb89cf24403f64190328d9b2dee398e3bab0aeb0366513ff159
-
Filesize
569KB
MD5b193af3d0371b5f27523ab5a836ada96
SHA1073907e2dd63de28c4cadc9db94450a5648eea73
SHA25629ae9d682ff68d8498a0df37dd1f5dc4dc23879dda47f29f491d4a53890b3321
SHA512fa95dbde32691ad06e72fa2020382dea651a23a5caec66fabac3e847e9bafb0e8b9b5bbce708cfb89cf24403f64190328d9b2dee398e3bab0aeb0366513ff159
-
Filesize
569KB
MD5b193af3d0371b5f27523ab5a836ada96
SHA1073907e2dd63de28c4cadc9db94450a5648eea73
SHA25629ae9d682ff68d8498a0df37dd1f5dc4dc23879dda47f29f491d4a53890b3321
SHA512fa95dbde32691ad06e72fa2020382dea651a23a5caec66fabac3e847e9bafb0e8b9b5bbce708cfb89cf24403f64190328d9b2dee398e3bab0aeb0366513ff159