Analysis
-
max time kernel
143s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 07:07
Behavioral task
behavioral1
Sample
ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe
Resource
win10v2004-20220812-en
General
-
Target
ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe
-
Size
544KB
-
MD5
29822b39493b8f61502166c43df96d9c
-
SHA1
0c0bc4af21d59af00a6a7f991b3f97bfeb624ba7
-
SHA256
ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074
-
SHA512
63b1d7dfbad8a81c42d3629deba18e0c5a0df289dd14cae442da6feddaba9b14dc857cfeb6e761572754eb9ff788c1a4a968b3c8dfcf4d4146b247e9b75a7066
-
SSDEEP
12288:YBMmKGnhDT+JlCdc9ecOdQv/8Gxj7zShD0dty2S:6MmnDC+dgendIxFNb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe -
Executes dropped EXE 2 IoCs
pid Process 1416 lsass.exe 1932 lsass.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1712 netsh.exe -
resource yara_rule behavioral1/memory/2000-63-0x0000000000400000-0x00000000004B6000-memory.dmp upx behavioral1/files/0x00140000000054ab-68.dat upx behavioral1/files/0x00140000000054ab-70.dat upx behavioral1/files/0x00140000000054ab-72.dat upx behavioral1/files/0x00140000000054ab-81.dat upx behavioral1/memory/1416-83-0x0000000000400000-0x00000000004B6000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2000-63-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe behavioral1/memory/1416-83-0x0000000000400000-0x00000000004B6000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2000 set thread context of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 1416 set thread context of 1932 1416 lsass.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 1932 lsass.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2000 wrote to memory of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 2000 wrote to memory of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 2000 wrote to memory of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 2000 wrote to memory of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 2000 wrote to memory of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 2000 wrote to memory of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 2000 wrote to memory of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 2000 wrote to memory of 916 2000 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 27 PID 916 wrote to memory of 1712 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 28 PID 916 wrote to memory of 1712 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 28 PID 916 wrote to memory of 1712 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 28 PID 916 wrote to memory of 1712 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 28 PID 916 wrote to memory of 1416 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 29 PID 916 wrote to memory of 1416 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 29 PID 916 wrote to memory of 1416 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 29 PID 916 wrote to memory of 1416 916 ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe 29 PID 1416 wrote to memory of 1932 1416 lsass.exe 31 PID 1416 wrote to memory of 1932 1416 lsass.exe 31 PID 1416 wrote to memory of 1932 1416 lsass.exe 31 PID 1416 wrote to memory of 1932 1416 lsass.exe 31 PID 1416 wrote to memory of 1932 1416 lsass.exe 31 PID 1416 wrote to memory of 1932 1416 lsass.exe 31 PID 1416 wrote to memory of 1932 1416 lsass.exe 31 PID 1416 wrote to memory of 1932 1416 lsass.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe"C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe"C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe"2⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram program = C:\Users\Admin\AppData\Roaming\lsass.exename = Nero mode = ENABLE3⤵
- Modifies Windows Firewall
PID:1712
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe" /d C:\Users\Admin\AppData\Local\Temp\ba028a926d29c6e6099385b893cc31fc22c42bfd55cffde514397b648bbfa074.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD5c53a8b7ec68db3d859b8ad2a39cf7d98
SHA138d6a8d24dc316dfb184d88a7e6cef6480a89ed1
SHA2562e7f807e3d0b881e45416a822edabbd4ea4dc8499b2541461f748271953aeb67
SHA5125c59f9ea1136d5e764fa82407fa93c425b1070dbb6f4ab19395b274b7df44c62661be562c0e0ab6af9c675b6874b82fe0fb8601c543609b6c32669e395f79b5b
-
Filesize
544KB
MD5c53a8b7ec68db3d859b8ad2a39cf7d98
SHA138d6a8d24dc316dfb184d88a7e6cef6480a89ed1
SHA2562e7f807e3d0b881e45416a822edabbd4ea4dc8499b2541461f748271953aeb67
SHA5125c59f9ea1136d5e764fa82407fa93c425b1070dbb6f4ab19395b274b7df44c62661be562c0e0ab6af9c675b6874b82fe0fb8601c543609b6c32669e395f79b5b
-
Filesize
544KB
MD5c53a8b7ec68db3d859b8ad2a39cf7d98
SHA138d6a8d24dc316dfb184d88a7e6cef6480a89ed1
SHA2562e7f807e3d0b881e45416a822edabbd4ea4dc8499b2541461f748271953aeb67
SHA5125c59f9ea1136d5e764fa82407fa93c425b1070dbb6f4ab19395b274b7df44c62661be562c0e0ab6af9c675b6874b82fe0fb8601c543609b6c32669e395f79b5b
-
Filesize
544KB
MD5c53a8b7ec68db3d859b8ad2a39cf7d98
SHA138d6a8d24dc316dfb184d88a7e6cef6480a89ed1
SHA2562e7f807e3d0b881e45416a822edabbd4ea4dc8499b2541461f748271953aeb67
SHA5125c59f9ea1136d5e764fa82407fa93c425b1070dbb6f4ab19395b274b7df44c62661be562c0e0ab6af9c675b6874b82fe0fb8601c543609b6c32669e395f79b5b