Analysis
-
max time kernel
150s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-01-2023 02:32
Static task
static1
Behavioral task
behavioral1
Sample
d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe
Resource
win10v2004-20221111-en
General
-
Target
d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe
-
Size
838KB
-
MD5
4a9fa940e898ebcc4f723cad30f0ad07
-
SHA1
d4bf4aa1811c33145d8fd41966f28fd5cdae2f88
-
SHA256
e1a4f84716f597d3bdb3097fd7d3cf6db230f853c2719156cc5a1ae1b7b5051c
-
SHA512
c23c3bbfda82df201f5f5ea429e0aa6c14ccfd8cbd43addbbfc5d77dfa0717ed02d60c7ab8a581cdfc651653223b339246374bd892cb7c546b5245e1ea0206bc
-
SSDEEP
12288:SXo30W26PmYn4QqWJgksAQYUT6eETMaICXadZe09CKEvYzQq6E+UFRZECNzYlL:SXo526e49CbaMavt0IfY8vE+MRGizML
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
isecurity.exepid process 1776 isecurity.exe -
Loads dropped DLL 3 IoCs
Processes:
d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exepid process 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
isecurity.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run isecurity.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
isecurity.exedescription ioc process File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\Z: isecurity.exe File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\W: isecurity.exe File opened (read-only) \??\Y: isecurity.exe File opened (read-only) \??\E: isecurity.exe File opened (read-only) \??\F: isecurity.exe File opened (read-only) \??\L: isecurity.exe File opened (read-only) \??\Q: isecurity.exe File opened (read-only) \??\V: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
isecurity.exedescription ioc process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exeisecurity.exepid process 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exepid process 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
isecurity.exepid process 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
isecurity.exepid process 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe 1776 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
isecurity.exepid process 1776 isecurity.exe 1776 isecurity.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exedescription pid process target process PID 1652 wrote to memory of 1776 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe isecurity.exe PID 1652 wrote to memory of 1776 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe isecurity.exe PID 1652 wrote to memory of 1776 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe isecurity.exe PID 1652 wrote to memory of 1776 1652 d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe isecurity.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe"C:\Users\Admin\AppData\Local\Temp\d4bf4aa1811c33145d8fd41966f28fd5cdae2f88.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
830KB
MD53f6a90e1ac85e296d3da4283ada9eaf2
SHA1ee32ce828dd445a4e45b057a68af8e9fde79d42a
SHA256ce0075e8ab4c6c5455b362c35e077ed409cef1c31f3ea5e1a7b007eaefc22757
SHA512bfdb6a57c4673ff209272279174305e9d19c54a569ca63b030be85f05cbc0c4845aa2447449def390a9b7356511950c65481505ec75f0eaefa65c5c1dfd208ac
-
Filesize
830KB
MD53f6a90e1ac85e296d3da4283ada9eaf2
SHA1ee32ce828dd445a4e45b057a68af8e9fde79d42a
SHA256ce0075e8ab4c6c5455b362c35e077ed409cef1c31f3ea5e1a7b007eaefc22757
SHA512bfdb6a57c4673ff209272279174305e9d19c54a569ca63b030be85f05cbc0c4845aa2447449def390a9b7356511950c65481505ec75f0eaefa65c5c1dfd208ac
-
Filesize
830KB
MD53f6a90e1ac85e296d3da4283ada9eaf2
SHA1ee32ce828dd445a4e45b057a68af8e9fde79d42a
SHA256ce0075e8ab4c6c5455b362c35e077ed409cef1c31f3ea5e1a7b007eaefc22757
SHA512bfdb6a57c4673ff209272279174305e9d19c54a569ca63b030be85f05cbc0c4845aa2447449def390a9b7356511950c65481505ec75f0eaefa65c5c1dfd208ac
-
Filesize
830KB
MD53f6a90e1ac85e296d3da4283ada9eaf2
SHA1ee32ce828dd445a4e45b057a68af8e9fde79d42a
SHA256ce0075e8ab4c6c5455b362c35e077ed409cef1c31f3ea5e1a7b007eaefc22757
SHA512bfdb6a57c4673ff209272279174305e9d19c54a569ca63b030be85f05cbc0c4845aa2447449def390a9b7356511950c65481505ec75f0eaefa65c5c1dfd208ac