Analysis
-
max time kernel
149s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe
Resource
win10v2004-20220812-en
General
-
Target
eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe
-
Size
904KB
-
MD5
93799bad9a3ce0b1f3b41ab006d86d7c
-
SHA1
8362b5a5523763b945746e34b44f33d247acae6d
-
SHA256
eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660
-
SHA512
9ebbba81b7636636f4426a516cbddf48f88796090d0e25296d234204b6e9befd306dd54a90612b7c1d5a88da68651b940c7cbb3c51368a480d3d33c2a27d9da6
-
SSDEEP
24576:yb8NrhwLjVz0g8boR4Mfzlf7zPgi0BVY:yb8NrhQqba4Mfzlf7Lz0BV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2000 defender.exe -
Loads dropped DLL 3 IoCs
pid Process 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Security Protection = "C:\\ProgramData\\defender.exe" defender.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run defender.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: defender.exe File opened (read-only) \??\H: defender.exe File opened (read-only) \??\J: defender.exe File opened (read-only) \??\L: defender.exe File opened (read-only) \??\M: defender.exe File opened (read-only) \??\U: defender.exe File opened (read-only) \??\W: defender.exe File opened (read-only) \??\Q: defender.exe File opened (read-only) \??\T: defender.exe File opened (read-only) \??\V: defender.exe File opened (read-only) \??\Z: defender.exe File opened (read-only) \??\E: defender.exe File opened (read-only) \??\F: defender.exe File opened (read-only) \??\I: defender.exe File opened (read-only) \??\P: defender.exe File opened (read-only) \??\R: defender.exe File opened (read-only) \??\S: defender.exe File opened (read-only) \??\X: defender.exe File opened (read-only) \??\K: defender.exe File opened (read-only) \??\N: defender.exe File opened (read-only) \??\O: defender.exe File opened (read-only) \??\Y: defender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe 2000 defender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2000 defender.exe 2000 defender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2000 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe 28 PID 1692 wrote to memory of 2000 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe 28 PID 1692 wrote to memory of 2000 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe 28 PID 1692 wrote to memory of 2000 1692 eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe"C:\Users\Admin\AppData\Local\Temp\eead43b3b20cf5a8542ffb61a70a3dc45ea54bac1573538e7143ea10f0a94660.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\ProgramData\defender.exeC:\ProgramData\defender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
875KB
MD54e6427e648e9dc07a8070ad69304033c
SHA17d55c8ce411ecd2d7fdcb89ce4724b66c60de3a9
SHA256c984bd1625ace9805329d62a811ec3b80a022af900c1c46d5f0d4a01e6506550
SHA5123d637b94b395302423401340de5f61a02501782c95162ad1a7d211e90fd461f13c4719d3bc0653c22302c00db1a928d262f9b26ba8df898c09a26cb6e2a2ecbb
-
Filesize
875KB
MD54e6427e648e9dc07a8070ad69304033c
SHA17d55c8ce411ecd2d7fdcb89ce4724b66c60de3a9
SHA256c984bd1625ace9805329d62a811ec3b80a022af900c1c46d5f0d4a01e6506550
SHA5123d637b94b395302423401340de5f61a02501782c95162ad1a7d211e90fd461f13c4719d3bc0653c22302c00db1a928d262f9b26ba8df898c09a26cb6e2a2ecbb
-
Filesize
875KB
MD54e6427e648e9dc07a8070ad69304033c
SHA17d55c8ce411ecd2d7fdcb89ce4724b66c60de3a9
SHA256c984bd1625ace9805329d62a811ec3b80a022af900c1c46d5f0d4a01e6506550
SHA5123d637b94b395302423401340de5f61a02501782c95162ad1a7d211e90fd461f13c4719d3bc0653c22302c00db1a928d262f9b26ba8df898c09a26cb6e2a2ecbb
-
Filesize
875KB
MD54e6427e648e9dc07a8070ad69304033c
SHA17d55c8ce411ecd2d7fdcb89ce4724b66c60de3a9
SHA256c984bd1625ace9805329d62a811ec3b80a022af900c1c46d5f0d4a01e6506550
SHA5123d637b94b395302423401340de5f61a02501782c95162ad1a7d211e90fd461f13c4719d3bc0653c22302c00db1a928d262f9b26ba8df898c09a26cb6e2a2ecbb
-
Filesize
875KB
MD54e6427e648e9dc07a8070ad69304033c
SHA17d55c8ce411ecd2d7fdcb89ce4724b66c60de3a9
SHA256c984bd1625ace9805329d62a811ec3b80a022af900c1c46d5f0d4a01e6506550
SHA5123d637b94b395302423401340de5f61a02501782c95162ad1a7d211e90fd461f13c4719d3bc0653c22302c00db1a928d262f9b26ba8df898c09a26cb6e2a2ecbb