Analysis
-
max time kernel
152s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 06:14
Static task
static1
Behavioral task
behavioral1
Sample
afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe
Resource
win10v2004-20220812-en
General
-
Target
afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe
-
Size
283KB
-
MD5
13ff7125821bc90d9d22ac62233bea0e
-
SHA1
9c868edd4a9684cbd367527403b07c9654027c89
-
SHA256
afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf
-
SHA512
aba0d2d3af8ee3e0d94b5c8bb6399ea33fe4127ca770b3fbd86f5974c6cc2a0e4804424aae198a59d4a9d3eaf4d34ba4033e9a50ddfc8eb520def0153b16899f
-
SSDEEP
6144:/w6JOerGp2aPeiyx+/Hqyo3ia/keIJSkH364n8LQTj3Fv0B2fJLY4:/wurYPex+/2rXI5XxBj3GMfJ
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1104 afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe 1104 afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1104 afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1104 afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe 1104 afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe"C:\Users\Admin\AppData\Local\Temp\afe957105ece51dadd9e6735a86f98145a7b33b2c0682b9c2a0408d1eb5219cf.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD593fde31f598bbfb7b0822648d4a83889
SHA19b7194bbdcee2ed5ee95769a79e44dcb1c848944
SHA2562bcf933a8542f0df471a459e3a37408c1209fbe367bcd738e7d7a1700a36f983
SHA512ee6ba0aafe8b2830ff5f8986be652f097f65632252abd55abefa4fd2e4269afdd62387ea5faff110da77463418b2e4406d5a3dc1ac7c884b7f676bff4b4e07cf
-
Filesize
496KB
MD593fde31f598bbfb7b0822648d4a83889
SHA19b7194bbdcee2ed5ee95769a79e44dcb1c848944
SHA2562bcf933a8542f0df471a459e3a37408c1209fbe367bcd738e7d7a1700a36f983
SHA512ee6ba0aafe8b2830ff5f8986be652f097f65632252abd55abefa4fd2e4269afdd62387ea5faff110da77463418b2e4406d5a3dc1ac7c884b7f676bff4b4e07cf