Analysis
-
max time kernel
146s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
4bbea264553c5ab3ada8d5346993841cca5adf69.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4bbea264553c5ab3ada8d5346993841cca5adf69.exe
Resource
win10v2004-20221111-en
General
-
Target
4bbea264553c5ab3ada8d5346993841cca5adf69.exe
-
Size
837KB
-
MD5
0c7b1f176655930b610a46b5edad4fae
-
SHA1
4bbea264553c5ab3ada8d5346993841cca5adf69
-
SHA256
e7a84aae836e84c314c382e2722872cbcffe042fadf539697fa52fa6a40d67b7
-
SHA512
cd2bb15a70127e467b6151e52f1cd81098db32e37d61ef89886a341d3b2b8448f9199a2a27f6e73883684114c5cd3931a3233fb4983801f5065a61fdbc24a87d
-
SSDEEP
24576:Ti4/mDs3EjQIXxCbq9EtzaZhES6iNU8576GY:Ti5Ds3mQSCuGzanES6iP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1988 isecurity.exe -
Loads dropped DLL 3 IoCs
pid Process 1312 4bbea264553c5ab3ada8d5346993841cca5adf69.exe 1312 4bbea264553c5ab3ada8d5346993841cca5adf69.exe 1312 4bbea264553c5ab3ada8d5346993841cca5adf69.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run isecurity.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Internet Security = "C:\\ProgramData\\isecurity.exe" isecurity.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: isecurity.exe File opened (read-only) \??\K: isecurity.exe File opened (read-only) \??\M: isecurity.exe File opened (read-only) \??\N: isecurity.exe File opened (read-only) \??\Q: isecurity.exe File opened (read-only) \??\X: isecurity.exe File opened (read-only) \??\E: isecurity.exe File opened (read-only) \??\F: isecurity.exe File opened (read-only) \??\H: isecurity.exe File opened (read-only) \??\L: isecurity.exe File opened (read-only) \??\U: isecurity.exe File opened (read-only) \??\I: isecurity.exe File opened (read-only) \??\J: isecurity.exe File opened (read-only) \??\O: isecurity.exe File opened (read-only) \??\R: isecurity.exe File opened (read-only) \??\W: isecurity.exe File opened (read-only) \??\Z: isecurity.exe File opened (read-only) \??\P: isecurity.exe File opened (read-only) \??\S: isecurity.exe File opened (read-only) \??\T: isecurity.exe File opened (read-only) \??\V: isecurity.exe File opened (read-only) \??\Y: isecurity.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 isecurity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1312 4bbea264553c5ab3ada8d5346993841cca5adf69.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe 1988 isecurity.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1988 isecurity.exe 1988 isecurity.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1988 1312 4bbea264553c5ab3ada8d5346993841cca5adf69.exe 28 PID 1312 wrote to memory of 1988 1312 4bbea264553c5ab3ada8d5346993841cca5adf69.exe 28 PID 1312 wrote to memory of 1988 1312 4bbea264553c5ab3ada8d5346993841cca5adf69.exe 28 PID 1312 wrote to memory of 1988 1312 4bbea264553c5ab3ada8d5346993841cca5adf69.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bbea264553c5ab3ada8d5346993841cca5adf69.exe"C:\Users\Admin\AppData\Local\Temp\4bbea264553c5ab3ada8d5346993841cca5adf69.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\ProgramData\isecurity.exeC:\ProgramData\isecurity.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
829KB
MD59e6a8eb74742ad1e9fa9a1fc09243dde
SHA1e1ae60930afbe752452b185c963ba1a306b976af
SHA25667e681222f6700ee2e0030a2f6c026dc25a5bb5bc26506d67d21cf3c66d8f60a
SHA512cdbedb5c56409447e8c3a554c167d4dedf7b28b90f251ec971f1161b72cf6ba4d43c6bca6f9c7d95060c9fe27008b94d0ac7c2fa079d21c4637c2086de8b1389
-
Filesize
829KB
MD59e6a8eb74742ad1e9fa9a1fc09243dde
SHA1e1ae60930afbe752452b185c963ba1a306b976af
SHA25667e681222f6700ee2e0030a2f6c026dc25a5bb5bc26506d67d21cf3c66d8f60a
SHA512cdbedb5c56409447e8c3a554c167d4dedf7b28b90f251ec971f1161b72cf6ba4d43c6bca6f9c7d95060c9fe27008b94d0ac7c2fa079d21c4637c2086de8b1389
-
Filesize
829KB
MD59e6a8eb74742ad1e9fa9a1fc09243dde
SHA1e1ae60930afbe752452b185c963ba1a306b976af
SHA25667e681222f6700ee2e0030a2f6c026dc25a5bb5bc26506d67d21cf3c66d8f60a
SHA512cdbedb5c56409447e8c3a554c167d4dedf7b28b90f251ec971f1161b72cf6ba4d43c6bca6f9c7d95060c9fe27008b94d0ac7c2fa079d21c4637c2086de8b1389
-
Filesize
829KB
MD59e6a8eb74742ad1e9fa9a1fc09243dde
SHA1e1ae60930afbe752452b185c963ba1a306b976af
SHA25667e681222f6700ee2e0030a2f6c026dc25a5bb5bc26506d67d21cf3c66d8f60a
SHA512cdbedb5c56409447e8c3a554c167d4dedf7b28b90f251ec971f1161b72cf6ba4d43c6bca6f9c7d95060c9fe27008b94d0ac7c2fa079d21c4637c2086de8b1389