Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe
Resource
win10v2004-20221111-en
General
-
Target
c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe
-
Size
448KB
-
MD5
3b311bb1c3c2a0616e525e87dbc1800f
-
SHA1
bc8ba842ec7b4c0a8996f28b3df880a7ab4ee2a4
-
SHA256
c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f
-
SHA512
f6d3a9fa091591d25c2110d14ded76118feebd8c13d1d18f99baae7fc16f59217b27852aa13e104a9536c7ee70b10e4736feb2591262f40ee8bee27ea21162d2
-
SSDEEP
3072:n0R1+aJe1mgawzxsBub861jIHxowJpstv5SVACakZF3S11YhAnqae2c6wsjeQA:n0RUTV5niStvL5kF3SYhuqp2c6ws
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 844 t2serv.exe -
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 844 t2serv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\t2serv = "C:\\Windows\\t2serv.exe s" t2serv.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\msvfnetl.dll t2serv.exe File created C:\Windows\SysWOW64\aclewmdm.dll t2serv.exe File created C:\Windows\SysWOW64\kbdcs11t.exe t2serv.exe File created C:\Windows\SysWOW64\e1.dll t2serv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\t2serv.exe c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe File created C:\Windows\t2serv.dll t2serv.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1292 notepad.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 844 t2serv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 844 t2serv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 844 t2serv.exe 844 t2serv.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1416 wrote to memory of 844 1416 c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe 27 PID 1416 wrote to memory of 844 1416 c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe 27 PID 1416 wrote to memory of 844 1416 c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe 27 PID 1416 wrote to memory of 844 1416 c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe 27 PID 1416 wrote to memory of 1292 1416 c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe 28 PID 1416 wrote to memory of 1292 1416 c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe 28 PID 1416 wrote to memory of 1292 1416 c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe 28 PID 1416 wrote to memory of 1292 1416 c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe 28 PID 844 wrote to memory of 1284 844 t2serv.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe"C:\Users\Admin\AppData\Local\Temp\c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\t2serv.exeC:\Windows\t2serv.exe s3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844
-
-
C:\Windows\SysWOW64\notepad.exeC:\Windows\System32\notepad.exe C:\Users\Admin\AppData\Local\Temp\2C20.tmp3⤵
- Opens file in notepad (likely ransom note)
PID:1292
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5f0e0ae615e8c27a819bab8c446c759c6
SHA1ad587bfcbace34bf643aa493970fcd21d9939aa2
SHA25634b05799f483162d3226347d9ad98e8fe7246d2b63ad3df38a583a52a772656c
SHA5129fb0e4a930d3cf1b098993ecd1299cbd6aa6f8e1ee648b88aed45210495a0b970ec1cd67dd91e6267d3c0e2291fb0dba960b4949d138ba3fe0db88bcbeee961b
-
Filesize
448KB
MD53b311bb1c3c2a0616e525e87dbc1800f
SHA1bc8ba842ec7b4c0a8996f28b3df880a7ab4ee2a4
SHA256c0d34e51befb3a8063ab6b2bfdf130f07a7c3889ed6b0d0c557c5559fe5e656f
SHA512f6d3a9fa091591d25c2110d14ded76118feebd8c13d1d18f99baae7fc16f59217b27852aa13e104a9536c7ee70b10e4736feb2591262f40ee8bee27ea21162d2
-
Filesize
11KB
MD588fc1168f041dfe7b14e092f212f25c0
SHA116373601b4da5335538bb06fb99baa9a0085c5d0
SHA256a76b7c09a406243e9193e15654f71fc14b6d8e8dd15d881ea42d8699abe712e7
SHA51250a8d71d38961c7796f33b672ac7af8afb62e968106dcfdce9cbb31ac336de2f3d9e8f898265444af65f9326ce0830a29fcabe3f5ace906da7427bad18e56387