Analysis
-
max time kernel
187s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2022 16:20
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win10v2004-20221111-en
General
-
Target
1.exe
-
Size
867KB
-
MD5
a451c909421cad8d940d100f2bfc4651
-
SHA1
97df30202fa0ae5a2366d0bef6ed415bdad3f2a2
-
SHA256
3b3f2716705df84738551d92feacc82c90afedff0bd823053e4e46848d2a3b7f
-
SHA512
5a2b8225eb7107fc77f6f6dd350b455de620ee7c4e3eecc65b1fe183bbf8a3d825510f18abca1d5c3a0c1f5d6f7ec8b2cff1e42f8944142c5a6cc70be47d1c0f
-
SSDEEP
12288:rrF5UskuwSU/FbrrOLyvs6DvFY7y2lmFjtTshX4WeQ0aFUA2UK7gW:rrjxwhGLKsUFUbWOiG5xK79
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
IZ9XU497.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run IZ9XU497.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\mbesp4mfw34210pq43pjutj1v5gn = "C:\\Users\\Admin\\AppData\\Roaming\\is5w2dm1q8t4h8t37q97h051\\mbesp4mfw34210pq43pjutj1v5gn.exe" IZ9XU497.exe -
Executes dropped EXE 3 IoCs
Processes:
mbesp4mfw34210pq43pjutj1v5gn.exeIZ9XU497.exeCYA61CS8O078U74477R48EO57N3W.exepid process 4412 mbesp4mfw34210pq43pjutj1v5gn.exe 2540 IZ9XU497.exe 3164 CYA61CS8O078U74477R48EO57N3W.exe -
Loads dropped DLL 3 IoCs
Processes:
mbesp4mfw34210pq43pjutj1v5gn.exeIZ9XU497.exeCYA61CS8O078U74477R48EO57N3W.exepid process 4412 mbesp4mfw34210pq43pjutj1v5gn.exe 2540 IZ9XU497.exe 3164 CYA61CS8O078U74477R48EO57N3W.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
mbesp4mfw34210pq43pjutj1v5gn.exeIZ9XU497.exeCYA61CS8O078U74477R48EO57N3W.exepid process 4412 mbesp4mfw34210pq43pjutj1v5gn.exe 4412 mbesp4mfw34210pq43pjutj1v5gn.exe 2540 IZ9XU497.exe 2540 IZ9XU497.exe 2540 IZ9XU497.exe 2540 IZ9XU497.exe 3164 CYA61CS8O078U74477R48EO57N3W.exe 3164 CYA61CS8O078U74477R48EO57N3W.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
mbesp4mfw34210pq43pjutj1v5gn.exeIZ9XU497.exeCYA61CS8O078U74477R48EO57N3W.exedescription pid process Token: SeDebugPrivilege 4412 mbesp4mfw34210pq43pjutj1v5gn.exe Token: SeDebugPrivilege 2540 IZ9XU497.exe Token: SeDebugPrivilege 3164 CYA61CS8O078U74477R48EO57N3W.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
mbesp4mfw34210pq43pjutj1v5gn.exeIZ9XU497.exeCYA61CS8O078U74477R48EO57N3W.exepid process 4412 mbesp4mfw34210pq43pjutj1v5gn.exe 4412 mbesp4mfw34210pq43pjutj1v5gn.exe 4412 mbesp4mfw34210pq43pjutj1v5gn.exe 4412 mbesp4mfw34210pq43pjutj1v5gn.exe 2540 IZ9XU497.exe 2540 IZ9XU497.exe 2540 IZ9XU497.exe 2540 IZ9XU497.exe 3164 CYA61CS8O078U74477R48EO57N3W.exe 3164 CYA61CS8O078U74477R48EO57N3W.exe 3164 CYA61CS8O078U74477R48EO57N3W.exe 3164 CYA61CS8O078U74477R48EO57N3W.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1.exembesp4mfw34210pq43pjutj1v5gn.exeIZ9XU497.exedescription pid process target process PID 4124 wrote to memory of 4412 4124 1.exe mbesp4mfw34210pq43pjutj1v5gn.exe PID 4124 wrote to memory of 4412 4124 1.exe mbesp4mfw34210pq43pjutj1v5gn.exe PID 4124 wrote to memory of 4412 4124 1.exe mbesp4mfw34210pq43pjutj1v5gn.exe PID 4412 wrote to memory of 2540 4412 mbesp4mfw34210pq43pjutj1v5gn.exe IZ9XU497.exe PID 4412 wrote to memory of 2540 4412 mbesp4mfw34210pq43pjutj1v5gn.exe IZ9XU497.exe PID 4412 wrote to memory of 2540 4412 mbesp4mfw34210pq43pjutj1v5gn.exe IZ9XU497.exe PID 2540 wrote to memory of 3164 2540 IZ9XU497.exe CYA61CS8O078U74477R48EO57N3W.exe PID 2540 wrote to memory of 3164 2540 IZ9XU497.exe CYA61CS8O078U74477R48EO57N3W.exe PID 2540 wrote to memory of 3164 2540 IZ9XU497.exe CYA61CS8O078U74477R48EO57N3W.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Roaming\is5w2dm1q8t4h8t37q97h051\mbesp4mfw34210pq43pjutj1v5gn.exeC:\Users\Admin\AppData\Roaming\is5w2dm1q8t4h8t37q97h051\mbesp4mfw34210pq43pjutj1v5gn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\493D2C9A1\IZ9XU497.exe433A5C55736572735C41646D696E5C417070446174615C526F616D696E675C6973357732646D31713874346838743337713937683035315C6D62657370346D6677333432313070713433706A75746A317635676E2E6578653⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\493D2C9A1\CYA61CS8O078U74477R48EO57N3W.exe433A5C55736572735C41646D696E5C417070446174615C526F616D696E675C6973357732646D31713874346838743337713937683035315C6D62657370346D6677333432313070713433706A75746A317635676E2E6578654⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD5a8824f0bfccab8e1b1d842900d265d9b
SHA16ac5da93d907ce7e2f73cc46d7200fc0d2503ff4
SHA256998fcd319497c50c3bd81621f05ee29cb4b5915f7026ba08f4cc172adc5768ba
SHA51216285b8caa9d9a634ec25a47facb7f9de0ecf771a55121ad1233fd5ce92348193fc91a95e86ec1aa1360ad48dfab631aa2b14b02e2311b49cc6abcc30ac2845e
-
Filesize
246B
MD5ef4740afed81a1194d995f2d571cde29
SHA1dec9cc578bcacdbd77c5819ada6389beac1bbbd9
SHA25662e2b5adefb60d2610e00022aa42614327ef3be7e85dfb337f481b4c63651f3e
SHA5123a417d1f0929814ae7d5e06bfbe599a2bbe18265eb4c59034ce9202cea0197820eae85bfdffe4da165b0e98fb3218a7f8b8e514797d729c3f5a65cac8d486e2f
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
158B
MD5a791cbda0cfb5b7f7245c029fd6dd016
SHA1e8bdbfd44bddcdd9c5c3b7962c730a317b773a03
SHA256e073944e92c08d51c618fe4ea1c899ddfaa99e01414edaca89468463bc50eb60
SHA5122101ac673b5b27b103ebec03edc0ac9c1e1abba719c53ab2132a6ae7d5c992b6d8ed76ba476046b06f47e39d7317a0be0e566423e403ab97d33196a7fbd0aaf1
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
424KB
MD57ac15af25453a3af866795745ab69cd4
SHA1305bd8a0be224ffb2fbaf321fc26ef04de09b5c7
SHA2561d0162cf04cd2181874ff9f016b0b6bfca4f4c6557f75a91298b2a761763a99d
SHA512e79091c0d0a83f08f0eefb093ef3caacf03c8473275fc36ff927cd78b07dbf3402fc7e6ffc7f050d7a2a13c670971507687cb03a274add0d9ed10fd448b2afdb
-
Filesize
424KB
MD57ac15af25453a3af866795745ab69cd4
SHA1305bd8a0be224ffb2fbaf321fc26ef04de09b5c7
SHA2561d0162cf04cd2181874ff9f016b0b6bfca4f4c6557f75a91298b2a761763a99d
SHA512e79091c0d0a83f08f0eefb093ef3caacf03c8473275fc36ff927cd78b07dbf3402fc7e6ffc7f050d7a2a13c670971507687cb03a274add0d9ed10fd448b2afdb
-
Filesize
424KB
MD57ac15af25453a3af866795745ab69cd4
SHA1305bd8a0be224ffb2fbaf321fc26ef04de09b5c7
SHA2561d0162cf04cd2181874ff9f016b0b6bfca4f4c6557f75a91298b2a761763a99d
SHA512e79091c0d0a83f08f0eefb093ef3caacf03c8473275fc36ff927cd78b07dbf3402fc7e6ffc7f050d7a2a13c670971507687cb03a274add0d9ed10fd448b2afdb
-
Filesize
424KB
MD57ac15af25453a3af866795745ab69cd4
SHA1305bd8a0be224ffb2fbaf321fc26ef04de09b5c7
SHA2561d0162cf04cd2181874ff9f016b0b6bfca4f4c6557f75a91298b2a761763a99d
SHA512e79091c0d0a83f08f0eefb093ef3caacf03c8473275fc36ff927cd78b07dbf3402fc7e6ffc7f050d7a2a13c670971507687cb03a274add0d9ed10fd448b2afdb
-
Filesize
424KB
MD57ac15af25453a3af866795745ab69cd4
SHA1305bd8a0be224ffb2fbaf321fc26ef04de09b5c7
SHA2561d0162cf04cd2181874ff9f016b0b6bfca4f4c6557f75a91298b2a761763a99d
SHA512e79091c0d0a83f08f0eefb093ef3caacf03c8473275fc36ff927cd78b07dbf3402fc7e6ffc7f050d7a2a13c670971507687cb03a274add0d9ed10fd448b2afdb
-
Filesize
158B
MD5a791cbda0cfb5b7f7245c029fd6dd016
SHA1e8bdbfd44bddcdd9c5c3b7962c730a317b773a03
SHA256e073944e92c08d51c618fe4ea1c899ddfaa99e01414edaca89468463bc50eb60
SHA5122101ac673b5b27b103ebec03edc0ac9c1e1abba719c53ab2132a6ae7d5c992b6d8ed76ba476046b06f47e39d7317a0be0e566423e403ab97d33196a7fbd0aaf1
-
Filesize
246B
MD5ef4740afed81a1194d995f2d571cde29
SHA1dec9cc578bcacdbd77c5819ada6389beac1bbbd9
SHA25662e2b5adefb60d2610e00022aa42614327ef3be7e85dfb337f481b4c63651f3e
SHA5123a417d1f0929814ae7d5e06bfbe599a2bbe18265eb4c59034ce9202cea0197820eae85bfdffe4da165b0e98fb3218a7f8b8e514797d729c3f5a65cac8d486e2f
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae
-
Filesize
167KB
MD554a010c60be10b65eee5506720fccabb
SHA118cfa274db7d6567441db036eb2b25b720d58884
SHA2569a4b728a0b652056cbd312dd917adc08c72c89b6f666472f4e3d59a1b8039d89
SHA512afb51acc8b684db72d5ee9ad7c340d852322af0862a80976c6830330c9e094bc77e760a5806ba883b437c0d10139aa783c21cd87acd405c453df98422d6b99ae