Analysis
-
max time kernel
176s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 08:19
Static task
static1
Behavioral task
behavioral1
Sample
076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe
Resource
win10v2004-20221111-en
General
-
Target
076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe
-
Size
344KB
-
MD5
e0e15c34551524c485be963b5353d471
-
SHA1
caefe9e82b4a255cc49230ec4b3d81993ecaabf5
-
SHA256
076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605
-
SHA512
9a6facd18af54339c92372aa152451daa1ace3bcc0ccafcc2c73baba11e9b246845d1d1af45316ca3ca70837b95ecf327a9d911503fd2f880c238a583a207a4d
-
SSDEEP
6144:K1TyITD+AQ9wjNE0mH7KBe5eousGp5hTs8tNNLw6FogzIcd/erU7j9F9yLQodO6r:KMMlOTuBsul55s87K6Fpd8iyLQt6mJ
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1712 1256 WerFault.exe 14 -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: 33 1044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1044 AUDIODG.EXE Token: 33 1044 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1044 AUDIODG.EXE Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe Token: SeShutdownPrivilege 1764 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1712 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe 28 PID 1256 wrote to memory of 1712 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe 28 PID 1256 wrote to memory of 1712 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe 28 PID 1256 wrote to memory of 1712 1256 076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe"C:\Users\Admin\AppData\Local\Temp\076d2292d6363afcde9522630aba6cf0d64eaa9ba54a8406260da3d1b9b8e605.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 3602⤵
- Program crash
PID:1712
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1764
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5441⤵
- Suspicious use of AdjustPrivilegeToken
PID:1044