Analysis
-
max time kernel
44s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 13:12
Static task
static1
Behavioral task
behavioral1
Sample
8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe
Resource
win10v2004-20220901-en
General
-
Target
8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe
-
Size
1.5MB
-
MD5
787b9c8d7cb27e9e8760de7952db9457
-
SHA1
dce41739eece4589a298557c8ad76666e2a55a3e
-
SHA256
8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d
-
SHA512
abcb853ac681d3fc139e7458da5b99055922eb2d84a5de6416b04aa3dd8375e38164fdd924b7fe0c5e0af04edef800f710ad241b7e83473316d6d2df7af0c741
-
SSDEEP
49152:3e7/I4a3ULKENZXQrqrpW5YvVgNv4Tov2PQ9eOwJG:K/ja3UuKerQp9NM4TKTwc
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1152 2546.exe 1556 5894.exe 1228 5894.exe -
resource yara_rule behavioral1/files/0x000b0000000126c8-74.dat upx behavioral1/files/0x000b0000000126c8-73.dat upx behavioral1/files/0x000b0000000126c8-76.dat upx behavioral1/files/0x000b0000000126c8-78.dat upx behavioral1/files/0x000b0000000126c8-81.dat upx behavioral1/files/0x000b0000000126c8-80.dat upx behavioral1/files/0x000b0000000126c8-79.dat upx behavioral1/files/0x000b0000000126c8-82.dat upx behavioral1/files/0x000b0000000126c8-98.dat upx behavioral1/files/0x000b0000000126c8-103.dat upx behavioral1/files/0x000b0000000126c8-102.dat upx behavioral1/files/0x000b0000000126c8-101.dat upx behavioral1/memory/1556-109-0x0000000000400000-0x00000000004F8000-memory.dmp upx -
Loads dropped DLL 15 IoCs
pid Process 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 1152 2546.exe 1152 2546.exe 1152 2546.exe 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 1556 5894.exe 1556 5894.exe 1556 5894.exe 1556 5894.exe 1228 5894.exe 1228 5894.exe 1228 5894.exe 1228 5894.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1556 set thread context of 1228 1556 5894.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers system information 1 TTPs 5 IoCs
Runs systeminfo.exe.
pid Process 1720 systeminfo.exe 1348 systeminfo.exe 1692 systeminfo.exe 1124 systeminfo.exe 1936 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1760 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1760 AUDIODG.EXE Token: 33 1760 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1760 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1228 5894.exe 1228 5894.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1152 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 27 PID 1484 wrote to memory of 1152 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 27 PID 1484 wrote to memory of 1152 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 27 PID 1484 wrote to memory of 1152 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 27 PID 1484 wrote to memory of 1152 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 27 PID 1484 wrote to memory of 1152 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 27 PID 1484 wrote to memory of 1152 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 27 PID 1152 wrote to memory of 1544 1152 2546.exe 28 PID 1152 wrote to memory of 1544 1152 2546.exe 28 PID 1152 wrote to memory of 1544 1152 2546.exe 28 PID 1152 wrote to memory of 1544 1152 2546.exe 28 PID 1152 wrote to memory of 1544 1152 2546.exe 28 PID 1152 wrote to memory of 1544 1152 2546.exe 28 PID 1152 wrote to memory of 1544 1152 2546.exe 28 PID 1544 wrote to memory of 1936 1544 CMD.exe 30 PID 1544 wrote to memory of 1936 1544 CMD.exe 30 PID 1544 wrote to memory of 1936 1544 CMD.exe 30 PID 1544 wrote to memory of 1936 1544 CMD.exe 30 PID 1544 wrote to memory of 1936 1544 CMD.exe 30 PID 1544 wrote to memory of 1936 1544 CMD.exe 30 PID 1544 wrote to memory of 1936 1544 CMD.exe 30 PID 1484 wrote to memory of 1556 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 32 PID 1484 wrote to memory of 1556 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 32 PID 1484 wrote to memory of 1556 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 32 PID 1484 wrote to memory of 1556 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 32 PID 1484 wrote to memory of 1556 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 32 PID 1484 wrote to memory of 1556 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 32 PID 1484 wrote to memory of 1556 1484 8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe 32 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1556 wrote to memory of 1228 1556 5894.exe 33 PID 1544 wrote to memory of 1720 1544 CMD.exe 36 PID 1544 wrote to memory of 1720 1544 CMD.exe 36 PID 1544 wrote to memory of 1720 1544 CMD.exe 36 PID 1544 wrote to memory of 1720 1544 CMD.exe 36 PID 1544 wrote to memory of 1720 1544 CMD.exe 36 PID 1544 wrote to memory of 1720 1544 CMD.exe 36 PID 1544 wrote to memory of 1720 1544 CMD.exe 36 PID 1544 wrote to memory of 1348 1544 CMD.exe 37 PID 1544 wrote to memory of 1348 1544 CMD.exe 37 PID 1544 wrote to memory of 1348 1544 CMD.exe 37 PID 1544 wrote to memory of 1348 1544 CMD.exe 37 PID 1544 wrote to memory of 1348 1544 CMD.exe 37 PID 1544 wrote to memory of 1348 1544 CMD.exe 37 PID 1544 wrote to memory of 1348 1544 CMD.exe 37 PID 1544 wrote to memory of 1692 1544 CMD.exe 38 PID 1544 wrote to memory of 1692 1544 CMD.exe 38 PID 1544 wrote to memory of 1692 1544 CMD.exe 38 PID 1544 wrote to memory of 1692 1544 CMD.exe 38 PID 1544 wrote to memory of 1692 1544 CMD.exe 38 PID 1544 wrote to memory of 1692 1544 CMD.exe 38 PID 1544 wrote to memory of 1692 1544 CMD.exe 38 PID 1544 wrote to memory of 1124 1544 CMD.exe 39 PID 1544 wrote to memory of 1124 1544 CMD.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe"C:\Users\Admin\AppData\Local\Temp\8366370bc62a01011489f6069a81f8fb72e0b38a361bf7d688df4d1a969f396d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\2546.exeC:\Users\Admin\AppData\Local\Temp\2546.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\CMD.exeCMD /C SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && DEL "C:\Users\Admin\AppData\Local\Temp\2546.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- Gathers system information
PID:1936
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- Gathers system information
PID:1720
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- Gathers system information
PID:1348
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- Gathers system information
PID:1692
-
-
C:\Windows\SysWOW64\systeminfo.exeSYSTEMINFO4⤵
- Gathers system information
PID:1124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5894.exeC:\Users\Admin\AppData\Local\Temp\5894.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\5894.exeC:\Users\Admin\AppData\Local\Temp\5894.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1228
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:1760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
1.2MB
MD5da81c93417114980c0d346940c0e5024
SHA10397e11706bf1ec1a03cbcdece59fd0f09976a26
SHA2564293bb5597d1c296b1ddc0e19fc2baa699b63c67bfd4774fa1fe83a462073260
SHA512ea6432d571dce4e86880ad29524dc633fcea46f9317afcebcc1a0211e9cab39124dea081c6edc53b77da8d5d5f5b1042406d8c64b1379af44c9eb7e2c354e2f9
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
724KB
MD56afe6a0e530269192424dee4e0598ca3
SHA1e9cf16dc11cbfc2b28919088d7e07947c274e6c2
SHA256623d041556c6883b56c7e22a38e30a55b04cb6cef194c0e4eb6e2dac1106e711
SHA5125da7da542479c5141fc97d0b7f2bc553e9cb50d9f5c8f8884247d58d61bf52eb74d5f095b4f13c0afa6cbc20c6a97fbdd1977e3af26ed105384e3fc17d6910dc
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822