Analysis
-
max time kernel
65s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 17:30
Static task
static1
Behavioral task
behavioral1
Sample
c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe
Resource
win10v2004-20220812-en
General
-
Target
c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe
-
Size
36KB
-
MD5
14482cc2f6ed4e97b98f8624170d3136
-
SHA1
4607b0f0b28e1dcd38257a5f79845573c67067b0
-
SHA256
c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197
-
SHA512
0b5f27dac39623754a24f14bb6eae123d684a30c9eeddfa78935b7ba7c381bb1b075e4528998b98c52abe57ae625bc1a6df4fc28cb9cdaa57da65cf52d12307f
-
SSDEEP
384:ZBl36dg/Bd8QVKKAINWoHhp2IC/YS4SehSWSXSW0SjS4SoSV9hDNJE:Hl36dgpd8iKnINJC/Yxnhd8I0X7Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 884 svchost.exe -
Deletes itself 1 IoCs
pid Process 784 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 784 cmd.exe 784 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1068 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2024 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 884 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2024 wrote to memory of 784 2024 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 28 PID 2024 wrote to memory of 784 2024 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 28 PID 2024 wrote to memory of 784 2024 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 28 PID 2024 wrote to memory of 784 2024 c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe 28 PID 784 wrote to memory of 1068 784 cmd.exe 30 PID 784 wrote to memory of 1068 784 cmd.exe 30 PID 784 wrote to memory of 1068 784 cmd.exe 30 PID 784 wrote to memory of 1068 784 cmd.exe 30 PID 784 wrote to memory of 884 784 cmd.exe 31 PID 784 wrote to memory of 884 784 cmd.exe 31 PID 784 wrote to memory of 884 784 cmd.exe 31 PID 784 wrote to memory of 884 784 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe"C:\Users\Admin\AppData\Local\Temp\c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Melt.bat" -s"2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\PING.EXEping ; 1.2; 0.3; 0.4 - n; 1 - w; 5003⤵
- Runs ping.exe
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exesvchost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5ffd4716da908eb2a2177e39c6e216984
SHA1b707da4f43cbc7cdfe8832658724a15b662c277b
SHA256c881b54e4262b07fc9220e9904d93e25ab96ee3768ed3c10b409ef1ac1fc6ddf
SHA512ce655c4ff8629b5b50dbb77fb187bff2a7d6ad8d1a355722411d4f5e35eac8f4be476d21059e621b0dd0591de43a8cc06da70e0b898fe3f3446ac1b525022bb0
-
Filesize
36KB
MD514482cc2f6ed4e97b98f8624170d3136
SHA14607b0f0b28e1dcd38257a5f79845573c67067b0
SHA256c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197
SHA5120b5f27dac39623754a24f14bb6eae123d684a30c9eeddfa78935b7ba7c381bb1b075e4528998b98c52abe57ae625bc1a6df4fc28cb9cdaa57da65cf52d12307f
-
Filesize
36KB
MD514482cc2f6ed4e97b98f8624170d3136
SHA14607b0f0b28e1dcd38257a5f79845573c67067b0
SHA256c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197
SHA5120b5f27dac39623754a24f14bb6eae123d684a30c9eeddfa78935b7ba7c381bb1b075e4528998b98c52abe57ae625bc1a6df4fc28cb9cdaa57da65cf52d12307f
-
Filesize
36KB
MD514482cc2f6ed4e97b98f8624170d3136
SHA14607b0f0b28e1dcd38257a5f79845573c67067b0
SHA256c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197
SHA5120b5f27dac39623754a24f14bb6eae123d684a30c9eeddfa78935b7ba7c381bb1b075e4528998b98c52abe57ae625bc1a6df4fc28cb9cdaa57da65cf52d12307f
-
Filesize
36KB
MD514482cc2f6ed4e97b98f8624170d3136
SHA14607b0f0b28e1dcd38257a5f79845573c67067b0
SHA256c755e40e98b4310b5b93e542750b9e4865598089415a2c255241833b43cbc197
SHA5120b5f27dac39623754a24f14bb6eae123d684a30c9eeddfa78935b7ba7c381bb1b075e4528998b98c52abe57ae625bc1a6df4fc28cb9cdaa57da65cf52d12307f