Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe
Resource
win10v2004-20220812-en
General
-
Target
a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe
-
Size
65KB
-
MD5
28d83f66f75200ea00912691a493914c
-
SHA1
a90020dce759e498ad899449159f635a0f16a07f
-
SHA256
a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
-
SHA512
26368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a
-
SSDEEP
1536:wD0PSuUXJQFDbWw/rZoVGGbNSY+A37feaCMJDmYb:SzqDbLrZoccSDADeak2
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe File opened for modification C:\Windows\system32\drivers\etc\hosts mancstmgr.exe -
Executes dropped EXE 3 IoCs
pid Process 1776 mancstmgr.exe 1876 mancstmgr.exe 1816 mancstmgr.exe -
Deletes itself 1 IoCs
pid Process 1328 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 1876 mancstmgr.exe 1876 mancstmgr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSN CST Manager = "mancstmgr.exe" a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run mancstmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSN CST Manager = "mancstmgr.exe" mancstmgr.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\mancstmgr.exe a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe File opened for modification C:\Windows\SysWOW64\mancstmgr.exe a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe File created C:\Windows\SysWOW64\mancstmgr.exe mancstmgr.exe File opened for modification C:\Windows\SysWOW64\mancstmgr.exe mancstmgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1184 set thread context of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1776 set thread context of 1876 1776 mancstmgr.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe Token: SeIncBasePriorityPrivilege 1876 mancstmgr.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 1184 wrote to memory of 2040 1184 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 27 PID 2040 wrote to memory of 1776 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 28 PID 2040 wrote to memory of 1776 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 28 PID 2040 wrote to memory of 1776 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 28 PID 2040 wrote to memory of 1776 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 28 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 2040 wrote to memory of 1328 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 30 PID 2040 wrote to memory of 1328 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 30 PID 2040 wrote to memory of 1328 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 30 PID 2040 wrote to memory of 1328 2040 a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe 30 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1776 wrote to memory of 1876 1776 mancstmgr.exe 29 PID 1876 wrote to memory of 1816 1876 mancstmgr.exe 32 PID 1876 wrote to memory of 1816 1876 mancstmgr.exe 32 PID 1876 wrote to memory of 1816 1876 mancstmgr.exe 32 PID 1876 wrote to memory of 1816 1876 mancstmgr.exe 32 PID 1816 wrote to memory of 964 1816 mancstmgr.exe 33 PID 1816 wrote to memory of 964 1816 mancstmgr.exe 33 PID 1816 wrote to memory of 964 1816 mancstmgr.exe 33 PID 1816 wrote to memory of 964 1816 mancstmgr.exe 33 PID 1876 wrote to memory of 304 1876 mancstmgr.exe 34 PID 1876 wrote to memory of 304 1876 mancstmgr.exe 34 PID 1876 wrote to memory of 304 1876 mancstmgr.exe 34 PID 1876 wrote to memory of 304 1876 mancstmgr.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe"C:\Users\Admin\AppData\Local\Temp\a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe"C:\Users\Admin\AppData\Local\Temp\a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\mancstmgr.exe"C:\Windows\system32\mancstmgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\mancstmgr.exe"C:\Windows\SysWOW64\mancstmgr.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\mancstmgr.exe"C:\Windows\system32\mancstmgr.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\mancstmgr.exe"C:\Windows\SysWOW64\mancstmgr.exe"6⤵PID:964
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\MANCST~1.EXE > nul5⤵PID:304
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A0625D~1.EXE > nul3⤵
- Deletes itself
PID:1328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD528d83f66f75200ea00912691a493914c
SHA1a90020dce759e498ad899449159f635a0f16a07f
SHA256a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
SHA51226368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a
-
Filesize
65KB
MD528d83f66f75200ea00912691a493914c
SHA1a90020dce759e498ad899449159f635a0f16a07f
SHA256a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
SHA51226368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a
-
Filesize
65KB
MD528d83f66f75200ea00912691a493914c
SHA1a90020dce759e498ad899449159f635a0f16a07f
SHA256a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
SHA51226368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a
-
Filesize
65KB
MD528d83f66f75200ea00912691a493914c
SHA1a90020dce759e498ad899449159f635a0f16a07f
SHA256a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
SHA51226368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a
-
Filesize
2KB
MD5e70a6bb213f4e35bc7ba89512fc78396
SHA100e76893d4e3b73ec668f4670e2e154bd567ff23
SHA25680ad1dcfb41f58b21cfbbaa1a35bf0f85034d91e5f886eec44e2a4c3a63b6d85
SHA51245bc02e515132ab698fd1c52ecf59c7d3b629f87dcd5be214548ea27f3b056f0c4ad77beb385c3491b05bcc6c91cf6020552096108a2d928ea7faab4bf14c7c8
-
Filesize
65KB
MD528d83f66f75200ea00912691a493914c
SHA1a90020dce759e498ad899449159f635a0f16a07f
SHA256a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
SHA51226368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a
-
Filesize
65KB
MD528d83f66f75200ea00912691a493914c
SHA1a90020dce759e498ad899449159f635a0f16a07f
SHA256a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
SHA51226368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a
-
Filesize
65KB
MD528d83f66f75200ea00912691a493914c
SHA1a90020dce759e498ad899449159f635a0f16a07f
SHA256a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
SHA51226368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a
-
Filesize
65KB
MD528d83f66f75200ea00912691a493914c
SHA1a90020dce759e498ad899449159f635a0f16a07f
SHA256a0625de4bb394d7bc9d8cc61151d50e58452b5281b63f742c9055072da8ece28
SHA51226368b6991c4c82fc932a581c836ee89feaa5479f30db097af9bc8395aa1839e07e5d308945140f95dc2ffd5c70bcbf3997ecafd4f26080438a493e9f95b311a