Analysis
-
max time kernel
193s -
max time network
293s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/01/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
Resource
win10-20220812-en
General
-
Target
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
-
Size
1.0MB
-
MD5
dd30580c68a1fe179b2c1fed353b2ecb
-
SHA1
a6d06a2904cafe55f4832337dcb2a5cc563ca456
-
SHA256
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9
-
SHA512
5b54a3f73c9e8fb3d9eff6ee579475c05724c5af703fa917438899857abeb730bea50f50752be4c10f12042c380d9a57d98ef9ef6b16658b39a950ff9b43a211
-
SSDEEP
24576:uurEZ30cjU8lSp/jh+Nc3VLn5W32gftwUys5NV:c0Olu/jwNcO9twH+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1296 kernel32.exe -
Deletes itself 1 IoCs
pid Process 1376 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Baskov = "C:\\Users\\Admin\\Baskov\\kernel32.exe" 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1296 set thread context of 780 1296 kernel32.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 684 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 780 InstallUtil.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1296 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 28 PID 2000 wrote to memory of 1296 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 28 PID 2000 wrote to memory of 1296 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 28 PID 2000 wrote to memory of 1296 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 28 PID 2000 wrote to memory of 1376 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 29 PID 2000 wrote to memory of 1376 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 29 PID 2000 wrote to memory of 1376 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 29 PID 2000 wrote to memory of 1376 2000 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 29 PID 1376 wrote to memory of 668 1376 cmd.exe 31 PID 1376 wrote to memory of 668 1376 cmd.exe 31 PID 1376 wrote to memory of 668 1376 cmd.exe 31 PID 1376 wrote to memory of 668 1376 cmd.exe 31 PID 1376 wrote to memory of 684 1376 cmd.exe 32 PID 1376 wrote to memory of 684 1376 cmd.exe 32 PID 1376 wrote to memory of 684 1376 cmd.exe 32 PID 1376 wrote to memory of 684 1376 cmd.exe 32 PID 1296 wrote to memory of 780 1296 kernel32.exe 33 PID 1296 wrote to memory of 780 1296 kernel32.exe 33 PID 1296 wrote to memory of 780 1296 kernel32.exe 33 PID 1296 wrote to memory of 780 1296 kernel32.exe 33 PID 1296 wrote to memory of 780 1296 kernel32.exe 33 PID 1296 wrote to memory of 780 1296 kernel32.exe 33 PID 1296 wrote to memory of 780 1296 kernel32.exe 33 PID 1296 wrote to memory of 780 1296 kernel32.exe 33 PID 1296 wrote to memory of 780 1296 kernel32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\Baskov\kernel32.exe"C:\Users\Admin\Baskov\kernel32.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:668
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:684
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651.0MB
MD58237709142d50ce4ea264e7e4422afa9
SHA122b8fbebd5d666594c1338c2fde727cf6ace6d28
SHA256b0e088b6ab0d94ec71f4ec38933ac35aca91e25ecbb3e8daf493770122165874
SHA512b121df712864397d45280f90e826e918a42aa5bae5d14c0bba1da330152dec8786451b0dcb44e364d27254421b68d90c1238bd75b7a437b8019e049ede9d7a96
-
Filesize
651.0MB
MD58237709142d50ce4ea264e7e4422afa9
SHA122b8fbebd5d666594c1338c2fde727cf6ace6d28
SHA256b0e088b6ab0d94ec71f4ec38933ac35aca91e25ecbb3e8daf493770122165874
SHA512b121df712864397d45280f90e826e918a42aa5bae5d14c0bba1da330152dec8786451b0dcb44e364d27254421b68d90c1238bd75b7a437b8019e049ede9d7a96