Analysis
-
max time kernel
1s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/01/2023, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe
Resource
win10v2004-20221111-en
General
-
Target
e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe
-
Size
248KB
-
MD5
758af0d15522dbc905e2ce91fff4d394
-
SHA1
2f62d64aebee525415e7911977ae3824bc2ae12e
-
SHA256
e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059
-
SHA512
6d3a1961751464bc9ee325b4dac9d87fc894959a43d15a75d25b0ee32d6a814b53a2c98034c544bd3bd8aeeda49cbb43de5bd3fd7dea417ee6ed023d1f74ecbd
-
SSDEEP
3072:8lCDqsuLBe6J8bQzorFB4xOPkuZajIRX60000VuyoP:eCxeBfuQ8sW60000VZoP
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\KillPC = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe" e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1536 wrote to memory of 112 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 26 PID 1536 wrote to memory of 112 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 26 PID 1536 wrote to memory of 112 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 26 PID 1536 wrote to memory of 112 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 26 PID 1536 wrote to memory of 1108 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 27 PID 1536 wrote to memory of 1108 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 27 PID 1536 wrote to memory of 1108 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 27 PID 1536 wrote to memory of 1108 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 27 PID 1536 wrote to memory of 1744 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 28 PID 1536 wrote to memory of 1744 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 28 PID 1536 wrote to memory of 1744 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 28 PID 1536 wrote to memory of 1744 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 28 PID 1536 wrote to memory of 888 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 29 PID 1536 wrote to memory of 888 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 29 PID 1536 wrote to memory of 888 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 29 PID 1536 wrote to memory of 888 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 29 PID 1536 wrote to memory of 1804 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 30 PID 1536 wrote to memory of 1804 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 30 PID 1536 wrote to memory of 1804 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 30 PID 1536 wrote to memory of 1804 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 30 PID 1536 wrote to memory of 964 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 31 PID 1536 wrote to memory of 964 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 31 PID 1536 wrote to memory of 964 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 31 PID 1536 wrote to memory of 964 1536 e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe"C:\Users\Admin\AppData\Local\Temp\e082740894e8f3a755e8bad76e02aec09af35d3d129e8620c5c29ff847124059.exe"1⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:112
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1108
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:888
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1804
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:964
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1700
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1172
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1732
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1956
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1772
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:672
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1704
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1092
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1168
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1376
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1480
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2080
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2112
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2148
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2172
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2192
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2212
-