Analysis
-
max time kernel
151s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
37992ee9284d0caf1738f37f3a18cdcbe028c731.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
37992ee9284d0caf1738f37f3a18cdcbe028c731.exe
Resource
win10v2004-20220901-en
General
-
Target
37992ee9284d0caf1738f37f3a18cdcbe028c731.exe
-
Size
852KB
-
MD5
87b78ec2010a39347f141adeede01628
-
SHA1
37992ee9284d0caf1738f37f3a18cdcbe028c731
-
SHA256
684e04a45383188f82f8c000490673060c629c15f6d61c031edb13df953712b9
-
SHA512
3a65517ef4d4cc5c3380dc8cfab946e8aeca12fc6a48f54fa4f2f42aa2aca41b9ac5fd76be29315de05c61095a703c53ae335fa6572c22aab42d8d0f54869a97
-
SSDEEP
24576:HbfjXLtl29eZFiG6SKPEfFR8LTQpfILi0aW:n7tc90Fp64fX8vQqLi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 388 isecurity.exe -
Loads dropped DLL 3 IoCs
pid Process 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run isecurity.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\V: isecurity.exe File opened (read-only) \??\Y: isecurity.exe File opened (read-only) \??\F: isecurity.exe File opened (read-only) \??\L: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\Q: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\Z: isecurity.exe File opened (read-only) \??\E: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\W: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe 388 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 388 isecurity.exe 388 isecurity.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 388 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe 27 PID 1732 wrote to memory of 388 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe 27 PID 1732 wrote to memory of 388 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe 27 PID 1732 wrote to memory of 388 1732 37992ee9284d0caf1738f37f3a18cdcbe028c731.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\37992ee9284d0caf1738f37f3a18cdcbe028c731.exe"C:\Users\Admin\AppData\Local\Temp\37992ee9284d0caf1738f37f3a18cdcbe028c731.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
844KB
MD53c3c187ffc8ea535683ca2e0d65fa40a
SHA17c386811352dc5ce71927e70009cda5361595c5b
SHA2567a23bb32f47126a01e9a8ca15d4de040bccf671ead03b6ce2a69ee1f3ea9dccf
SHA512768ecdf333fbc0308dab9a20d1685446f6340e5e102aab901dfe2dccce2ef1604387225ba8b3b3c2685e9916c943297d9e57b28727334cb253e94f2aa0e5f3ea
-
Filesize
844KB
MD53c3c187ffc8ea535683ca2e0d65fa40a
SHA17c386811352dc5ce71927e70009cda5361595c5b
SHA2567a23bb32f47126a01e9a8ca15d4de040bccf671ead03b6ce2a69ee1f3ea9dccf
SHA512768ecdf333fbc0308dab9a20d1685446f6340e5e102aab901dfe2dccce2ef1604387225ba8b3b3c2685e9916c943297d9e57b28727334cb253e94f2aa0e5f3ea
-
Filesize
844KB
MD53c3c187ffc8ea535683ca2e0d65fa40a
SHA17c386811352dc5ce71927e70009cda5361595c5b
SHA2567a23bb32f47126a01e9a8ca15d4de040bccf671ead03b6ce2a69ee1f3ea9dccf
SHA512768ecdf333fbc0308dab9a20d1685446f6340e5e102aab901dfe2dccce2ef1604387225ba8b3b3c2685e9916c943297d9e57b28727334cb253e94f2aa0e5f3ea
-
Filesize
844KB
MD53c3c187ffc8ea535683ca2e0d65fa40a
SHA17c386811352dc5ce71927e70009cda5361595c5b
SHA2567a23bb32f47126a01e9a8ca15d4de040bccf671ead03b6ce2a69ee1f3ea9dccf
SHA512768ecdf333fbc0308dab9a20d1685446f6340e5e102aab901dfe2dccce2ef1604387225ba8b3b3c2685e9916c943297d9e57b28727334cb253e94f2aa0e5f3ea