Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14/01/2023, 15:37
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
29.4MB
-
MD5
8ef684ee2f0d30041d4a089f92f4ab06
-
SHA1
573aaabccc069703bdf9fab9fd31168303495225
-
SHA256
1620726a24a49b48d5cc9aa9a26ff4bbe849a4a583031fb8155ec216ddd591a5
-
SHA512
7a429a21b11f4e9d77e22ed9ae25a7b2f09621edc74b19a6e06849df44e5458477d7510e4ef438e2f674bace8d334777dde4823b8006e09f6849944a768e280d
-
SSDEEP
786432:zlB8NEuBnbj8cJRPVCZGc7Iv5aMMu8lM9mLAsJpUIL7Rl:JBMkTwc7yaMRR9mnJdL7n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 484 tmp.exe -
resource yara_rule behavioral1/memory/1244-56-0x0000000000400000-0x00000000013E0000-memory.dmp vmprotect behavioral1/memory/1244-55-0x0000000000400000-0x00000000013E0000-memory.dmp vmprotect behavioral1/files/0x001b00000001249b-59.dat vmprotect behavioral1/files/0x001b00000001249b-61.dat vmprotect behavioral1/memory/484-64-0x0000000000400000-0x00000000013E0000-memory.dmp vmprotect behavioral1/memory/484-65-0x0000000000400000-0x00000000013E0000-memory.dmp vmprotect behavioral1/memory/1244-68-0x0000000000400000-0x00000000013E0000-memory.dmp vmprotect behavioral1/files/0x001b00000001249b-69.dat vmprotect behavioral1/memory/484-72-0x0000000000400000-0x00000000013E0000-memory.dmp vmprotect -
Deletes itself 1 IoCs
pid Process 484 tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 1244 tmp.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: tmp.exe File opened (read-only) \??\Q: tmp.exe File opened (read-only) \??\S: tmp.exe File opened (read-only) \??\Z: tmp.exe File opened (read-only) \??\N: tmp.exe File opened (read-only) \??\P: tmp.exe File opened (read-only) \??\R: tmp.exe File opened (read-only) \??\Y: tmp.exe File opened (read-only) \??\B: tmp.exe File opened (read-only) \??\I: tmp.exe File opened (read-only) \??\J: tmp.exe File opened (read-only) \??\K: tmp.exe File opened (read-only) \??\L: tmp.exe File opened (read-only) \??\O: tmp.exe File opened (read-only) \??\T: tmp.exe File opened (read-only) \??\U: tmp.exe File opened (read-only) \??\A: tmp.exe File opened (read-only) \??\E: tmp.exe File opened (read-only) \??\F: tmp.exe File opened (read-only) \??\G: tmp.exe File opened (read-only) \??\V: tmp.exe File opened (read-only) \??\W: tmp.exe File opened (read-only) \??\M: tmp.exe File opened (read-only) \??\X: tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1244 tmp.exe 484 tmp.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1244 tmp.exe 1244 tmp.exe 1244 tmp.exe 1244 tmp.exe 1244 tmp.exe 484 tmp.exe 484 tmp.exe 484 tmp.exe 484 tmp.exe 484 tmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1244 wrote to memory of 484 1244 tmp.exe 28 PID 1244 wrote to memory of 484 1244 tmp.exe 28 PID 1244 wrote to memory of 484 1244 tmp.exe 28 PID 1244 wrote to memory of 484 1244 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\»ðÁú´«Ëµ\tmp.exeC:\»ðÁú´«Ëµ\tmp.exe2⤵
- Executes dropped EXE
- Deletes itself
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41B
MD5fa4a6393f371a289f6b187ba6aaada19
SHA184f4f1eedd713c86f97605f7e8a23a1f2d2678a3
SHA25653ea98bb79bd329140803195f5c46b117986bdeba86f301f9613de657f38b528
SHA5122c6d8429aa7bfb9b2357c3ef710a5d98cd1cb62f29ba36091ddf4a05fe28cc7b35a4609aa7cd1e1f59350c004e2ab9f1c18cc2506bde92f64d6fa3413e0a0519
-
Filesize
12B
MD531faed83df2eca847735542ee9b1b7e5
SHA1979d00621b850712b39786ee3ab7e15cadf6bcb0
SHA2568fad92805acff624ee904cad8e79d6ba3df21a053f6092d7d6851f7ffcee67a9
SHA512c3ec17ec5fb051058b23b16ac95a118cd86940135ba65097ef88a9d2089e2cbfe611cd3c7587ed538e8df4d6425f71cd78eda7040b70beabe0fabb9e6729874a
-
Filesize
29.4MB
MD58ef684ee2f0d30041d4a089f92f4ab06
SHA1573aaabccc069703bdf9fab9fd31168303495225
SHA2561620726a24a49b48d5cc9aa9a26ff4bbe849a4a583031fb8155ec216ddd591a5
SHA5127a429a21b11f4e9d77e22ed9ae25a7b2f09621edc74b19a6e06849df44e5458477d7510e4ef438e2f674bace8d334777dde4823b8006e09f6849944a768e280d
-
Filesize
29.4MB
MD58ef684ee2f0d30041d4a089f92f4ab06
SHA1573aaabccc069703bdf9fab9fd31168303495225
SHA2561620726a24a49b48d5cc9aa9a26ff4bbe849a4a583031fb8155ec216ddd591a5
SHA5127a429a21b11f4e9d77e22ed9ae25a7b2f09621edc74b19a6e06849df44e5458477d7510e4ef438e2f674bace8d334777dde4823b8006e09f6849944a768e280d
-
Filesize
29.4MB
MD58ef684ee2f0d30041d4a089f92f4ab06
SHA1573aaabccc069703bdf9fab9fd31168303495225
SHA2561620726a24a49b48d5cc9aa9a26ff4bbe849a4a583031fb8155ec216ddd591a5
SHA5127a429a21b11f4e9d77e22ed9ae25a7b2f09621edc74b19a6e06849df44e5458477d7510e4ef438e2f674bace8d334777dde4823b8006e09f6849944a768e280d