Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 06:44
Behavioral task
behavioral1
Sample
c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe
Resource
win10v2004-20220812-en
General
-
Target
c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe
-
Size
397KB
-
MD5
1b6c4f4ac1769885588f31c4691b1a49
-
SHA1
68440a2054b8df33790297ef6a077555116fe97c
-
SHA256
c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4
-
SHA512
fb9be3ddfb80ef34910910302c4fcae0aa0ddc71e6bd3a8031e43a744d6c6635032f83b19bcfbf6dff2d1746f7793e42ba8d1f358e7800d09fbd5eb796925b2f
-
SSDEEP
12288:NeUD1SCAGA7FzWPivPQWxKrB8JNJkmoSjo:NeBrGAAPEQ7rGtko
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 536 gxdqbpjii.exe -
resource yara_rule behavioral1/files/0x0008000000005c51-61.dat upx behavioral1/files/0x0008000000005c51-62.dat upx behavioral1/files/0x0008000000005c51-64.dat upx behavioral1/memory/536-65-0x0000000001000000-0x00000000010B9000-memory.dmp upx behavioral1/files/0x0008000000005c51-67.dat upx behavioral1/files/0x0008000000005c51-70.dat upx -
Deletes itself 1 IoCs
pid Process 2012 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 2012 cmd.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1720 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 764 PING.EXE -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1720 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe 536 gxdqbpjii.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2012 1380 c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe 27 PID 1380 wrote to memory of 2012 1380 c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe 27 PID 1380 wrote to memory of 2012 1380 c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe 27 PID 1380 wrote to memory of 2012 1380 c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe 27 PID 2012 wrote to memory of 1720 2012 cmd.exe 29 PID 2012 wrote to memory of 1720 2012 cmd.exe 29 PID 2012 wrote to memory of 1720 2012 cmd.exe 29 PID 2012 wrote to memory of 1720 2012 cmd.exe 29 PID 2012 wrote to memory of 764 2012 cmd.exe 31 PID 2012 wrote to memory of 764 2012 cmd.exe 31 PID 2012 wrote to memory of 764 2012 cmd.exe 31 PID 2012 wrote to memory of 764 2012 cmd.exe 31 PID 2012 wrote to memory of 536 2012 cmd.exe 32 PID 2012 wrote to memory of 536 2012 cmd.exe 32 PID 2012 wrote to memory of 536 2012 cmd.exe 32 PID 2012 wrote to memory of 536 2012 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe"C:\Users\Admin\AppData\Local\Temp\c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1380 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4.exe" & start C:\Users\Admin\AppData\Local\GXDQBP~1.EXE -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 13803⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:764
-
-
C:\Users\Admin\AppData\Local\gxdqbpjii.exeC:\Users\Admin\AppData\Local\GXDQBP~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:536
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD51b6c4f4ac1769885588f31c4691b1a49
SHA168440a2054b8df33790297ef6a077555116fe97c
SHA256c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4
SHA512fb9be3ddfb80ef34910910302c4fcae0aa0ddc71e6bd3a8031e43a744d6c6635032f83b19bcfbf6dff2d1746f7793e42ba8d1f358e7800d09fbd5eb796925b2f
-
Filesize
397KB
MD51b6c4f4ac1769885588f31c4691b1a49
SHA168440a2054b8df33790297ef6a077555116fe97c
SHA256c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4
SHA512fb9be3ddfb80ef34910910302c4fcae0aa0ddc71e6bd3a8031e43a744d6c6635032f83b19bcfbf6dff2d1746f7793e42ba8d1f358e7800d09fbd5eb796925b2f
-
Filesize
397KB
MD51b6c4f4ac1769885588f31c4691b1a49
SHA168440a2054b8df33790297ef6a077555116fe97c
SHA256c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4
SHA512fb9be3ddfb80ef34910910302c4fcae0aa0ddc71e6bd3a8031e43a744d6c6635032f83b19bcfbf6dff2d1746f7793e42ba8d1f358e7800d09fbd5eb796925b2f
-
Filesize
397KB
MD51b6c4f4ac1769885588f31c4691b1a49
SHA168440a2054b8df33790297ef6a077555116fe97c
SHA256c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4
SHA512fb9be3ddfb80ef34910910302c4fcae0aa0ddc71e6bd3a8031e43a744d6c6635032f83b19bcfbf6dff2d1746f7793e42ba8d1f358e7800d09fbd5eb796925b2f
-
Filesize
397KB
MD51b6c4f4ac1769885588f31c4691b1a49
SHA168440a2054b8df33790297ef6a077555116fe97c
SHA256c2e9b00d8b7a16bab6e735933752700899b631172d98eab1fc2967e8339597a4
SHA512fb9be3ddfb80ef34910910302c4fcae0aa0ddc71e6bd3a8031e43a744d6c6635032f83b19bcfbf6dff2d1746f7793e42ba8d1f358e7800d09fbd5eb796925b2f