Analysis

  • max time kernel
    206s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 12:58

General

  • Target

    c7ac918e6a16a319cd1ec20229d3be32ec8641cdd243a5b0d6e1a74a37f45223.exe

  • Size

    371KB

  • MD5

    8db36a57f62accfce13e89df2f38252d

  • SHA1

    bc955d81212c0cc185406c5591385f9acfced33e

  • SHA256

    c7ac918e6a16a319cd1ec20229d3be32ec8641cdd243a5b0d6e1a74a37f45223

  • SHA512

    f449e45bf98795c59eca2b0a0da4d9265af65c1f353eb4d44fbadbc804a2c0a4a9910b65e396c300e92a191e992c116c34e1347f8d48d65c8b2136ae4ee4b589

  • SSDEEP

    6144:C6T7ykP3BcAwkbnfrINC1BVtlEsH4SfkuLFNXr1BOoKRIDoACs/UuKiQrXInw14p:3ykc5kLd1BflvH4StNbPKRkYMSIWYh

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7ac918e6a16a319cd1ec20229d3be32ec8641cdd243a5b0d6e1a74a37f45223.exe
    "C:\Users\Admin\AppData\Local\Temp\c7ac918e6a16a319cd1ec20229d3be32ec8641cdd243a5b0d6e1a74a37f45223.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\lcwpoOpiE6.exe
      "C:\Users\Admin\lcwpoOpiE6.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Users\Admin\ljtej.exe
        "C:\Users\Admin\ljtej.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetWindowsHookEx
        PID:1412
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del lcwpoOpiE6.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1112
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:1352
    • C:\Users\Admin\nzQlrRzKCSpT.exe
      "C:\Users\Admin\nzQlrRzKCSpT.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:692
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\system32\svchost.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:876
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del nzQlrRzKCSpT.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:1708
    • C:\Users\Admin\nzr.exe
      "C:\Users\Admin\nzr.exe"
      2⤵
      • Executes dropped EXE
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of AdjustPrivilegeToken
      PID:924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lcwpoOpiE6.exe

    Filesize

    420KB

    MD5

    efbfb6be20f3801ca005d1040e2ac835

    SHA1

    bfb4b87d012fcebfd4da30f5bbe89d57390a0fac

    SHA256

    83320165f8ecce6c2432eff5b82cee0e94fb20501435ad46cfcf841f8c482589

    SHA512

    47f680624698e0fc9705159401b0eb5cb5798fb241b0ebfd31eaee140c043591167fbc664a3c7f8d943812d4efec7dbf248d0d9a3b0e4c5950cc4524230e92ba

  • C:\Users\Admin\lcwpoOpiE6.exe

    Filesize

    420KB

    MD5

    efbfb6be20f3801ca005d1040e2ac835

    SHA1

    bfb4b87d012fcebfd4da30f5bbe89d57390a0fac

    SHA256

    83320165f8ecce6c2432eff5b82cee0e94fb20501435ad46cfcf841f8c482589

    SHA512

    47f680624698e0fc9705159401b0eb5cb5798fb241b0ebfd31eaee140c043591167fbc664a3c7f8d943812d4efec7dbf248d0d9a3b0e4c5950cc4524230e92ba

  • C:\Users\Admin\ljtej.exe

    Filesize

    420KB

    MD5

    2418fbe10f6630fdc00d73155c1c908d

    SHA1

    0ca42479d4ea58caa6e3c7fc1158c2d26727cac9

    SHA256

    394f38c6788ff838e3fab1e66397d05400d9c7690b3d8bda007c43635f7a70ba

    SHA512

    4dbf0f7177e31625c7cdd6b5a3136da458d83d73fcfed1b1615c8a6cfc2b44b4ca9268cbb908ae80dc72eb989c411ad6dc0f8ed123b2fb38604a15952e5da5e3

  • C:\Users\Admin\ljtej.exe

    Filesize

    420KB

    MD5

    2418fbe10f6630fdc00d73155c1c908d

    SHA1

    0ca42479d4ea58caa6e3c7fc1158c2d26727cac9

    SHA256

    394f38c6788ff838e3fab1e66397d05400d9c7690b3d8bda007c43635f7a70ba

    SHA512

    4dbf0f7177e31625c7cdd6b5a3136da458d83d73fcfed1b1615c8a6cfc2b44b4ca9268cbb908ae80dc72eb989c411ad6dc0f8ed123b2fb38604a15952e5da5e3

  • C:\Users\Admin\nzQlrRzKCSpT.exe

    Filesize

    120KB

    MD5

    fbedb1325c04ba0d321725b3fbca79e5

    SHA1

    c1cbaf5ce790cca2eac97ea5ef3e9051291841e0

    SHA256

    8fb95e30c957e92bd3ea42fc07c866fb6d71d3b9320f8fec19391bea5f1ef284

    SHA512

    79f92ce50425aa3633dbe8a8e5e67523cf357fb3dd742cf80b51e573ee85e0198d66b459cc940c5e0d2aa9cf7bf84e4705825ba6b58de05a9e5d4457bc6cc601

  • C:\Users\Admin\nzQlrRzKCSpT.exe

    Filesize

    120KB

    MD5

    fbedb1325c04ba0d321725b3fbca79e5

    SHA1

    c1cbaf5ce790cca2eac97ea5ef3e9051291841e0

    SHA256

    8fb95e30c957e92bd3ea42fc07c866fb6d71d3b9320f8fec19391bea5f1ef284

    SHA512

    79f92ce50425aa3633dbe8a8e5e67523cf357fb3dd742cf80b51e573ee85e0198d66b459cc940c5e0d2aa9cf7bf84e4705825ba6b58de05a9e5d4457bc6cc601

  • C:\Users\Admin\nzr.exe

    Filesize

    126KB

    MD5

    92911c5d331554c274d362f02e688272

    SHA1

    58cc94c667d722a7c0598f7af7de8a42184d72a9

    SHA256

    f5b3d5f68d76feb12d2b22aa0e8ccba9f755a4018a2d3447655f6fef2744d025

    SHA512

    d2440f90b04831c78fa3844293a84955f04be5c2d7cbe4c82165a28c8c31448c9cdbf13f693f9d392f0505aff6d77528a324ac1edbde7b4510ea25cb78305a66

  • C:\Users\Admin\nzr.exe

    Filesize

    126KB

    MD5

    92911c5d331554c274d362f02e688272

    SHA1

    58cc94c667d722a7c0598f7af7de8a42184d72a9

    SHA256

    f5b3d5f68d76feb12d2b22aa0e8ccba9f755a4018a2d3447655f6fef2744d025

    SHA512

    d2440f90b04831c78fa3844293a84955f04be5c2d7cbe4c82165a28c8c31448c9cdbf13f693f9d392f0505aff6d77528a324ac1edbde7b4510ea25cb78305a66

  • \Users\Admin\lcwpoOpiE6.exe

    Filesize

    420KB

    MD5

    efbfb6be20f3801ca005d1040e2ac835

    SHA1

    bfb4b87d012fcebfd4da30f5bbe89d57390a0fac

    SHA256

    83320165f8ecce6c2432eff5b82cee0e94fb20501435ad46cfcf841f8c482589

    SHA512

    47f680624698e0fc9705159401b0eb5cb5798fb241b0ebfd31eaee140c043591167fbc664a3c7f8d943812d4efec7dbf248d0d9a3b0e4c5950cc4524230e92ba

  • \Users\Admin\lcwpoOpiE6.exe

    Filesize

    420KB

    MD5

    efbfb6be20f3801ca005d1040e2ac835

    SHA1

    bfb4b87d012fcebfd4da30f5bbe89d57390a0fac

    SHA256

    83320165f8ecce6c2432eff5b82cee0e94fb20501435ad46cfcf841f8c482589

    SHA512

    47f680624698e0fc9705159401b0eb5cb5798fb241b0ebfd31eaee140c043591167fbc664a3c7f8d943812d4efec7dbf248d0d9a3b0e4c5950cc4524230e92ba

  • \Users\Admin\ljtej.exe

    Filesize

    420KB

    MD5

    2418fbe10f6630fdc00d73155c1c908d

    SHA1

    0ca42479d4ea58caa6e3c7fc1158c2d26727cac9

    SHA256

    394f38c6788ff838e3fab1e66397d05400d9c7690b3d8bda007c43635f7a70ba

    SHA512

    4dbf0f7177e31625c7cdd6b5a3136da458d83d73fcfed1b1615c8a6cfc2b44b4ca9268cbb908ae80dc72eb989c411ad6dc0f8ed123b2fb38604a15952e5da5e3

  • \Users\Admin\ljtej.exe

    Filesize

    420KB

    MD5

    2418fbe10f6630fdc00d73155c1c908d

    SHA1

    0ca42479d4ea58caa6e3c7fc1158c2d26727cac9

    SHA256

    394f38c6788ff838e3fab1e66397d05400d9c7690b3d8bda007c43635f7a70ba

    SHA512

    4dbf0f7177e31625c7cdd6b5a3136da458d83d73fcfed1b1615c8a6cfc2b44b4ca9268cbb908ae80dc72eb989c411ad6dc0f8ed123b2fb38604a15952e5da5e3

  • \Users\Admin\nzQlrRzKCSpT.exe

    Filesize

    120KB

    MD5

    fbedb1325c04ba0d321725b3fbca79e5

    SHA1

    c1cbaf5ce790cca2eac97ea5ef3e9051291841e0

    SHA256

    8fb95e30c957e92bd3ea42fc07c866fb6d71d3b9320f8fec19391bea5f1ef284

    SHA512

    79f92ce50425aa3633dbe8a8e5e67523cf357fb3dd742cf80b51e573ee85e0198d66b459cc940c5e0d2aa9cf7bf84e4705825ba6b58de05a9e5d4457bc6cc601

  • \Users\Admin\nzQlrRzKCSpT.exe

    Filesize

    120KB

    MD5

    fbedb1325c04ba0d321725b3fbca79e5

    SHA1

    c1cbaf5ce790cca2eac97ea5ef3e9051291841e0

    SHA256

    8fb95e30c957e92bd3ea42fc07c866fb6d71d3b9320f8fec19391bea5f1ef284

    SHA512

    79f92ce50425aa3633dbe8a8e5e67523cf357fb3dd742cf80b51e573ee85e0198d66b459cc940c5e0d2aa9cf7bf84e4705825ba6b58de05a9e5d4457bc6cc601

  • \Users\Admin\nzr.exe

    Filesize

    126KB

    MD5

    92911c5d331554c274d362f02e688272

    SHA1

    58cc94c667d722a7c0598f7af7de8a42184d72a9

    SHA256

    f5b3d5f68d76feb12d2b22aa0e8ccba9f755a4018a2d3447655f6fef2744d025

    SHA512

    d2440f90b04831c78fa3844293a84955f04be5c2d7cbe4c82165a28c8c31448c9cdbf13f693f9d392f0505aff6d77528a324ac1edbde7b4510ea25cb78305a66

  • \Users\Admin\nzr.exe

    Filesize

    126KB

    MD5

    92911c5d331554c274d362f02e688272

    SHA1

    58cc94c667d722a7c0598f7af7de8a42184d72a9

    SHA256

    f5b3d5f68d76feb12d2b22aa0e8ccba9f755a4018a2d3447655f6fef2744d025

    SHA512

    d2440f90b04831c78fa3844293a84955f04be5c2d7cbe4c82165a28c8c31448c9cdbf13f693f9d392f0505aff6d77528a324ac1edbde7b4510ea25cb78305a66

  • memory/876-88-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/876-95-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/876-82-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/876-83-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/876-87-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/876-80-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/876-79-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/924-97-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/924-98-0x0000000001D70000-0x0000000001E70000-memory.dmp

    Filesize

    1024KB

  • memory/1472-54-0x0000000075A11000-0x0000000075A13000-memory.dmp

    Filesize

    8KB