Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe
Resource
win10v2004-20220812-en
General
-
Target
f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe
-
Size
476KB
-
MD5
58f88a94ccdbb791f2897513fd3001d1
-
SHA1
76af5d2870c74bffca24b870fcb57d1339bcb464
-
SHA256
f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b
-
SHA512
5fdb9ae2491c37778c8409d8823b636f80393087e6a11564ad4d31c6207ff54fbcea4eec78875e4dedeb5b4c29b981304ff49d5814195425f2155b601b193423
-
SSDEEP
12288:4roiftmwGUlVgkwQ2kNHGVGdlm8EAUUJ32U8RBB:4rofwjl1vcodlHEO+nB
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1872 winini.exe 584 winhost.exe -
Loads dropped DLL 3 IoCs
pid Process 1376 f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe 1376 f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe 1872 winini.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Live = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winini.exe" winini.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1872 set thread context of 584 1872 winini.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1872 winini.exe Token: SeIncreaseQuotaPrivilege 584 winhost.exe Token: SeSecurityPrivilege 584 winhost.exe Token: SeTakeOwnershipPrivilege 584 winhost.exe Token: SeLoadDriverPrivilege 584 winhost.exe Token: SeSystemProfilePrivilege 584 winhost.exe Token: SeSystemtimePrivilege 584 winhost.exe Token: SeProfSingleProcessPrivilege 584 winhost.exe Token: SeIncBasePriorityPrivilege 584 winhost.exe Token: SeCreatePagefilePrivilege 584 winhost.exe Token: SeBackupPrivilege 584 winhost.exe Token: SeRestorePrivilege 584 winhost.exe Token: SeShutdownPrivilege 584 winhost.exe Token: SeDebugPrivilege 584 winhost.exe Token: SeSystemEnvironmentPrivilege 584 winhost.exe Token: SeChangeNotifyPrivilege 584 winhost.exe Token: SeRemoteShutdownPrivilege 584 winhost.exe Token: SeUndockPrivilege 584 winhost.exe Token: SeManageVolumePrivilege 584 winhost.exe Token: SeImpersonatePrivilege 584 winhost.exe Token: SeCreateGlobalPrivilege 584 winhost.exe Token: 33 584 winhost.exe Token: 34 584 winhost.exe Token: 35 584 winhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 584 winhost.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1872 1376 f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe 26 PID 1376 wrote to memory of 1872 1376 f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe 26 PID 1376 wrote to memory of 1872 1376 f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe 26 PID 1376 wrote to memory of 1872 1376 f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe 26 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27 PID 1872 wrote to memory of 584 1872 winini.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe"C:\Users\Admin\AppData\Local\Temp\f1a576bf1379bcf8d1cccf104d65740a4acbbdf23d96cc35da45af3b34f5bb4b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\winini.exe"C:\Users\Admin\AppData\Local\Temp\winini.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\winhost.exeC:\Users\Admin\AppData\Local\Temp\winhost.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:584
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
468KB
MD5600de325e1cb62223602e10ca57b2fb5
SHA1fef83ffca40657b2f2dacdc2ec9dd40e2067dfb0
SHA2569368b4ed33f4111ac287bd41efb3104adccb0bf98e31121445d198a4f0553d49
SHA512634d6c06d0951a61efc0fba7cc77280e6f0b78afaeda66469a939cc2f4098605a38a90043115ab9bc88dd7e6128cd8367900e90de1ba8b126850e044ef89f5c0
-
Filesize
468KB
MD5600de325e1cb62223602e10ca57b2fb5
SHA1fef83ffca40657b2f2dacdc2ec9dd40e2067dfb0
SHA2569368b4ed33f4111ac287bd41efb3104adccb0bf98e31121445d198a4f0553d49
SHA512634d6c06d0951a61efc0fba7cc77280e6f0b78afaeda66469a939cc2f4098605a38a90043115ab9bc88dd7e6128cd8367900e90de1ba8b126850e044ef89f5c0
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
468KB
MD5600de325e1cb62223602e10ca57b2fb5
SHA1fef83ffca40657b2f2dacdc2ec9dd40e2067dfb0
SHA2569368b4ed33f4111ac287bd41efb3104adccb0bf98e31121445d198a4f0553d49
SHA512634d6c06d0951a61efc0fba7cc77280e6f0b78afaeda66469a939cc2f4098605a38a90043115ab9bc88dd7e6128cd8367900e90de1ba8b126850e044ef89f5c0
-
Filesize
468KB
MD5600de325e1cb62223602e10ca57b2fb5
SHA1fef83ffca40657b2f2dacdc2ec9dd40e2067dfb0
SHA2569368b4ed33f4111ac287bd41efb3104adccb0bf98e31121445d198a4f0553d49
SHA512634d6c06d0951a61efc0fba7cc77280e6f0b78afaeda66469a939cc2f4098605a38a90043115ab9bc88dd7e6128cd8367900e90de1ba8b126850e044ef89f5c0