Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-01-2023 16:38
Static task
static1
Behavioral task
behavioral1
Sample
1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe
Resource
win10v2004-20220812-en
General
-
Target
1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe
-
Size
825KB
-
MD5
30316fe7b005a9290642487257f5d272
-
SHA1
9853434d6fd84e02caf658b3df7ec9c67f706df4
-
SHA256
1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d
-
SHA512
d62e86094c9468edea83e2f506c970fe51c29d09f3c893a1233828e277d76278842de0f9737ab6dbe467e979da709a34f78ea5006d54bc2e2e9100e56fa62613
-
SSDEEP
24576:UEqUtbqFIaESpE8uhmTapaUZoluIaxrwiS2:UVUt5XS4cUZo0zr62
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exepid process 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exedescription pid process target process PID 2028 set thread context of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 set thread context of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe -
Drops file in Windows directory 1 IoCs
Processes:
1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exedescription ioc process File opened for modification C:\Windows\ 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exedescription pid process target process PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 2028 wrote to memory of 980 2028 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 980 wrote to memory of 1692 980 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe PID 1692 wrote to memory of 1160 1692 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe dw20.exe PID 1692 wrote to memory of 1160 1692 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe dw20.exe PID 1692 wrote to memory of 1160 1692 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe dw20.exe PID 1692 wrote to memory of 1160 1692 1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe"C:\Users\Admin\AppData\Local\Temp\1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe"C:\Users\Admin\AppData\Local\Temp\1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe"C:\Users\Admin\AppData\Local\Temp\1b6e1188112772c78051e25d51e97db0aba461f6e031cdb98af8f2279731444d.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8564⤵PID:1160
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
85KB
MD53ce12db61d191b38ecedfee86120698a
SHA11712a069b6a6824cc60ec52c073ba1475854e640
SHA256e0fcb0b7da1c78124836b7fdd521bb4978a784c56613f807d17de905320df443
SHA51291d988a69188ed371916e0d096bd165c95f7ae991d2e8113646475226c579ed59a5d4cde6d7189ce72dbde973bd1206974185c1e3449a7ec220b8f47cf3ddbb6