Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe
Resource
win10v2004-20221111-en
General
-
Target
a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe
-
Size
316KB
-
MD5
750870a6876e868b8198ebedd1c468b6
-
SHA1
d4c07a4768c5975ca3a0d608d432c2102e600dad
-
SHA256
a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5
-
SHA512
33bf7d6a913ca125597e95d664cb0c15ed9f22f29af0f12600fe4b49504f89ece0f2ef1599789662c377babec6ce4d9602a39f178fb6d8e38b92789155b428c6
-
SSDEEP
6144:6tjFMvCNlfbJ+7Nj6Y9BEN92Nzukgm9t17GxQ2qMUYTmJ:6tG6N1bkJ6Ykb2x4+tZbb
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1168 faany.exe 1748 msn.exe -
Loads dropped DLL 6 IoCs
pid Process 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 1168 faany.exe 1168 faany.exe 1168 faany.exe 1748 msn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1748 msn.exe 1748 msn.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1168 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 27 PID 1600 wrote to memory of 1168 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 27 PID 1600 wrote to memory of 1168 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 27 PID 1600 wrote to memory of 1168 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 27 PID 1600 wrote to memory of 1168 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 27 PID 1600 wrote to memory of 1168 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 27 PID 1600 wrote to memory of 1168 1600 a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe 27 PID 1168 wrote to memory of 1748 1168 faany.exe 28 PID 1168 wrote to memory of 1748 1168 faany.exe 28 PID 1168 wrote to memory of 1748 1168 faany.exe 28 PID 1168 wrote to memory of 1748 1168 faany.exe 28 PID 1168 wrote to memory of 1748 1168 faany.exe 28 PID 1168 wrote to memory of 1748 1168 faany.exe 28 PID 1168 wrote to memory of 1748 1168 faany.exe 28 PID 1748 wrote to memory of 1208 1748 msn.exe 19 PID 1748 wrote to memory of 1208 1748 msn.exe 19 PID 1748 wrote to memory of 1208 1748 msn.exe 19 PID 1748 wrote to memory of 1208 1748 msn.exe 19
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe"C:\Users\Admin\AppData\Local\Temp\a470f516a2fed028246a1e0b22ce53911adcb0bcab2f4383a54621e5949c79f5.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\faany.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\faany.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\msn.exe"C:\Users\Admin\AppData\Local\Temp\msn.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD547f035a38f19aeb26f9e1ccd2049b5e3
SHA1cadac5fac34e6f9e508f62c4b9615088c5e2ff4a
SHA25665c3899662df344a80fc02c822a12b321d8918edf87262a0ea0ef23be2be74c3
SHA51212f91b6dea11b5e3a1960fa226fcda2913bb2db632d23d1a80423c0be8aa42ab87fcf6951b77ab2402941e1cf00e6fc9f0e0ab8d3a7c6c2b9aba91ca00df2d93
-
Filesize
163KB
MD547f035a38f19aeb26f9e1ccd2049b5e3
SHA1cadac5fac34e6f9e508f62c4b9615088c5e2ff4a
SHA25665c3899662df344a80fc02c822a12b321d8918edf87262a0ea0ef23be2be74c3
SHA51212f91b6dea11b5e3a1960fa226fcda2913bb2db632d23d1a80423c0be8aa42ab87fcf6951b77ab2402941e1cf00e6fc9f0e0ab8d3a7c6c2b9aba91ca00df2d93
-
Filesize
161KB
MD5124b190b15fb1152b80a7ea40eafac49
SHA1310e49500836e8a4adaeefc234e38d18f0b9d8a1
SHA256de2c1e61ee06efc568b49499b27a230222d3c4124c49aad97c55adb6423dba71
SHA5120a06fd79d0ca5f00cc33e001d6032c857595b516deb8372e96f8709883cf330f285feecb1d3d09dff9eb30f5ba54ff790cc7592bfec74a5859bcbcda9f6842a8
-
Filesize
161KB
MD5124b190b15fb1152b80a7ea40eafac49
SHA1310e49500836e8a4adaeefc234e38d18f0b9d8a1
SHA256de2c1e61ee06efc568b49499b27a230222d3c4124c49aad97c55adb6423dba71
SHA5120a06fd79d0ca5f00cc33e001d6032c857595b516deb8372e96f8709883cf330f285feecb1d3d09dff9eb30f5ba54ff790cc7592bfec74a5859bcbcda9f6842a8
-
Filesize
163KB
MD547f035a38f19aeb26f9e1ccd2049b5e3
SHA1cadac5fac34e6f9e508f62c4b9615088c5e2ff4a
SHA25665c3899662df344a80fc02c822a12b321d8918edf87262a0ea0ef23be2be74c3
SHA51212f91b6dea11b5e3a1960fa226fcda2913bb2db632d23d1a80423c0be8aa42ab87fcf6951b77ab2402941e1cf00e6fc9f0e0ab8d3a7c6c2b9aba91ca00df2d93
-
Filesize
163KB
MD547f035a38f19aeb26f9e1ccd2049b5e3
SHA1cadac5fac34e6f9e508f62c4b9615088c5e2ff4a
SHA25665c3899662df344a80fc02c822a12b321d8918edf87262a0ea0ef23be2be74c3
SHA51212f91b6dea11b5e3a1960fa226fcda2913bb2db632d23d1a80423c0be8aa42ab87fcf6951b77ab2402941e1cf00e6fc9f0e0ab8d3a7c6c2b9aba91ca00df2d93
-
Filesize
163KB
MD547f035a38f19aeb26f9e1ccd2049b5e3
SHA1cadac5fac34e6f9e508f62c4b9615088c5e2ff4a
SHA25665c3899662df344a80fc02c822a12b321d8918edf87262a0ea0ef23be2be74c3
SHA51212f91b6dea11b5e3a1960fa226fcda2913bb2db632d23d1a80423c0be8aa42ab87fcf6951b77ab2402941e1cf00e6fc9f0e0ab8d3a7c6c2b9aba91ca00df2d93
-
Filesize
161KB
MD5124b190b15fb1152b80a7ea40eafac49
SHA1310e49500836e8a4adaeefc234e38d18f0b9d8a1
SHA256de2c1e61ee06efc568b49499b27a230222d3c4124c49aad97c55adb6423dba71
SHA5120a06fd79d0ca5f00cc33e001d6032c857595b516deb8372e96f8709883cf330f285feecb1d3d09dff9eb30f5ba54ff790cc7592bfec74a5859bcbcda9f6842a8
-
Filesize
161KB
MD5124b190b15fb1152b80a7ea40eafac49
SHA1310e49500836e8a4adaeefc234e38d18f0b9d8a1
SHA256de2c1e61ee06efc568b49499b27a230222d3c4124c49aad97c55adb6423dba71
SHA5120a06fd79d0ca5f00cc33e001d6032c857595b516deb8372e96f8709883cf330f285feecb1d3d09dff9eb30f5ba54ff790cc7592bfec74a5859bcbcda9f6842a8
-
Filesize
161KB
MD5124b190b15fb1152b80a7ea40eafac49
SHA1310e49500836e8a4adaeefc234e38d18f0b9d8a1
SHA256de2c1e61ee06efc568b49499b27a230222d3c4124c49aad97c55adb6423dba71
SHA5120a06fd79d0ca5f00cc33e001d6032c857595b516deb8372e96f8709883cf330f285feecb1d3d09dff9eb30f5ba54ff790cc7592bfec74a5859bcbcda9f6842a8