Resubmissions
10/01/2023, 00:56
230110-batjlabg9z 1010/01/2023, 00:50
230110-a6w4xsbg8x 1009/01/2023, 22:18
230109-172nxabd8y 8Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
Resource
win10v2004-20220812-en
General
-
Target
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe
-
Size
1.0MB
-
MD5
dd30580c68a1fe179b2c1fed353b2ecb
-
SHA1
a6d06a2904cafe55f4832337dcb2a5cc563ca456
-
SHA256
8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9
-
SHA512
5b54a3f73c9e8fb3d9eff6ee579475c05724c5af703fa917438899857abeb730bea50f50752be4c10f12042c380d9a57d98ef9ef6b16658b39a950ff9b43a211
-
SSDEEP
24576:uurEZ30cjU8lSp/jh+Nc3VLn5W32gftwUys5NV:c0Olu/jwNcO9twH+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1212 kernel32.exe -
Deletes itself 1 IoCs
pid Process 588 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Baskov = "C:\\Users\\Admin\\Baskov\\kernel32.exe" 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1212 set thread context of 868 1212 kernel32.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 576 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 868 InstallUtil.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1212 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 28 PID 1112 wrote to memory of 1212 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 28 PID 1112 wrote to memory of 1212 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 28 PID 1112 wrote to memory of 1212 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 28 PID 1112 wrote to memory of 588 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 29 PID 1112 wrote to memory of 588 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 29 PID 1112 wrote to memory of 588 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 29 PID 1112 wrote to memory of 588 1112 8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe 29 PID 588 wrote to memory of 580 588 cmd.exe 31 PID 588 wrote to memory of 580 588 cmd.exe 31 PID 588 wrote to memory of 580 588 cmd.exe 31 PID 588 wrote to memory of 580 588 cmd.exe 31 PID 588 wrote to memory of 576 588 cmd.exe 32 PID 588 wrote to memory of 576 588 cmd.exe 32 PID 588 wrote to memory of 576 588 cmd.exe 32 PID 588 wrote to memory of 576 588 cmd.exe 32 PID 1212 wrote to memory of 748 1212 kernel32.exe 33 PID 1212 wrote to memory of 748 1212 kernel32.exe 33 PID 1212 wrote to memory of 748 1212 kernel32.exe 33 PID 1212 wrote to memory of 748 1212 kernel32.exe 33 PID 1212 wrote to memory of 748 1212 kernel32.exe 33 PID 1212 wrote to memory of 748 1212 kernel32.exe 33 PID 1212 wrote to memory of 748 1212 kernel32.exe 33 PID 1212 wrote to memory of 868 1212 kernel32.exe 34 PID 1212 wrote to memory of 868 1212 kernel32.exe 34 PID 1212 wrote to memory of 868 1212 kernel32.exe 34 PID 1212 wrote to memory of 868 1212 kernel32.exe 34 PID 1212 wrote to memory of 868 1212 kernel32.exe 34 PID 1212 wrote to memory of 868 1212 kernel32.exe 34 PID 1212 wrote to memory of 868 1212 kernel32.exe 34 PID 1212 wrote to memory of 868 1212 kernel32.exe 34 PID 1212 wrote to memory of 868 1212 kernel32.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\Baskov\kernel32.exe"C:\Users\Admin\Baskov\kernel32.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\8e83b4c798ca9e24e6b33ff30817a4bd2703bad34701f220f9b5f5e730fedcd9.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:580
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:576
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651.0MB
MD58237709142d50ce4ea264e7e4422afa9
SHA122b8fbebd5d666594c1338c2fde727cf6ace6d28
SHA256b0e088b6ab0d94ec71f4ec38933ac35aca91e25ecbb3e8daf493770122165874
SHA512b121df712864397d45280f90e826e918a42aa5bae5d14c0bba1da330152dec8786451b0dcb44e364d27254421b68d90c1238bd75b7a437b8019e049ede9d7a96
-
Filesize
651.0MB
MD58237709142d50ce4ea264e7e4422afa9
SHA122b8fbebd5d666594c1338c2fde727cf6ace6d28
SHA256b0e088b6ab0d94ec71f4ec38933ac35aca91e25ecbb3e8daf493770122165874
SHA512b121df712864397d45280f90e826e918a42aa5bae5d14c0bba1da330152dec8786451b0dcb44e364d27254421b68d90c1238bd75b7a437b8019e049ede9d7a96