Analysis
-
max time kernel
339s -
max time network
342s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 10:39
Static task
static1
Behavioral task
behavioral1
Sample
Doc-102PO-207841001jpg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Doc-102PO-207841001jpg.exe
Resource
win10v2004-20220812-en
General
-
Target
Doc-102PO-207841001jpg.exe
-
Size
2MB
-
MD5
0596aefc251ba32dcb538593b0616568
-
SHA1
9ceb68e35b93711e8247512c21ad2ccd6b8da938
-
SHA256
f085f0ece42084f2ce26c28a27ebc9457ae32b2ecd632b3073500b7e17805659
-
SHA512
da0d4d63ce9ecfc3d892b20f55be6769a5d28a77d9c3b7f4cb22abc51e3be604c102c1e6b7c4d7464dc8dc3f4730b204654c82292ad8899004e90cd7b4a66a5d
-
SSDEEP
49152:gbB0FQB5MLPlG5/8uMLq0u5hRD5pbjX7i4l8B/oy6kRMF4mK/LPS/yYCxL:g90sW0dRfj7O/oyBqi/TS/yYCxL
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Doc-102PO-207841001jpg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Coxsx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Vfiatkcr\\Coxsx.exe\"" Doc-102PO-207841001jpg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Doc-102PO-207841001jpg.exedescription pid process target process PID 1516 set thread context of 1544 1516 Doc-102PO-207841001jpg.exe Doc-102PO-207841001jpg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 636 ipconfig.exe 1092 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1096 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Doc-102PO-207841001jpg.exepowershell.exedescription pid process Token: SeDebugPrivilege 1516 Doc-102PO-207841001jpg.exe Token: SeDebugPrivilege 1096 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
Doc-102PO-207841001jpg.execmd.execmd.exedescription pid process target process PID 1516 wrote to memory of 240 1516 Doc-102PO-207841001jpg.exe cmd.exe PID 1516 wrote to memory of 240 1516 Doc-102PO-207841001jpg.exe cmd.exe PID 1516 wrote to memory of 240 1516 Doc-102PO-207841001jpg.exe cmd.exe PID 240 wrote to memory of 1092 240 cmd.exe ipconfig.exe PID 240 wrote to memory of 1092 240 cmd.exe ipconfig.exe PID 240 wrote to memory of 1092 240 cmd.exe ipconfig.exe PID 1516 wrote to memory of 1096 1516 Doc-102PO-207841001jpg.exe powershell.exe PID 1516 wrote to memory of 1096 1516 Doc-102PO-207841001jpg.exe powershell.exe PID 1516 wrote to memory of 1096 1516 Doc-102PO-207841001jpg.exe powershell.exe PID 1516 wrote to memory of 956 1516 Doc-102PO-207841001jpg.exe cmd.exe PID 1516 wrote to memory of 956 1516 Doc-102PO-207841001jpg.exe cmd.exe PID 1516 wrote to memory of 956 1516 Doc-102PO-207841001jpg.exe cmd.exe PID 956 wrote to memory of 636 956 cmd.exe ipconfig.exe PID 956 wrote to memory of 636 956 cmd.exe ipconfig.exe PID 956 wrote to memory of 636 956 cmd.exe ipconfig.exe PID 1516 wrote to memory of 1544 1516 Doc-102PO-207841001jpg.exe Doc-102PO-207841001jpg.exe PID 1516 wrote to memory of 1544 1516 Doc-102PO-207841001jpg.exe Doc-102PO-207841001jpg.exe PID 1516 wrote to memory of 1544 1516 Doc-102PO-207841001jpg.exe Doc-102PO-207841001jpg.exe PID 1516 wrote to memory of 1544 1516 Doc-102PO-207841001jpg.exe Doc-102PO-207841001jpg.exe PID 1516 wrote to memory of 1544 1516 Doc-102PO-207841001jpg.exe Doc-102PO-207841001jpg.exe PID 1516 wrote to memory of 1544 1516 Doc-102PO-207841001jpg.exe Doc-102PO-207841001jpg.exe PID 1516 wrote to memory of 1544 1516 Doc-102PO-207841001jpg.exe Doc-102PO-207841001jpg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doc-102PO-207841001jpg.exe"C:\Users\Admin\AppData\Local\Temp\Doc-102PO-207841001jpg.exe"
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/release
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /release
- Gathers network information
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/renew
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /renew
- Gathers network information
-
C:\Users\Admin\AppData\Local\Temp\Doc-102PO-207841001jpg.exeC:\Users\Admin\AppData\Local\Temp\Doc-102PO-207841001jpg.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Downloads
-
memory/240-58-0x0000000000000000-mapping.dmp
-
memory/636-68-0x0000000000000000-mapping.dmp
-
memory/956-67-0x0000000000000000-mapping.dmp
-
memory/1092-59-0x0000000000000000-mapping.dmp
-
memory/1096-64-0x00000000024A4000-0x00000000024A7000-memory.dmpFilesize
12KB
-
memory/1096-65-0x00000000024AB000-0x00000000024CA000-memory.dmpFilesize
124KB
-
memory/1096-60-0x0000000000000000-mapping.dmp
-
memory/1096-61-0x000007FEFBC01000-0x000007FEFBC03000-memory.dmpFilesize
8KB
-
memory/1096-62-0x000007FEEC630000-0x000007FEED053000-memory.dmpFilesize
10MB
-
memory/1096-63-0x000007FEEBAD0000-0x000007FEEC62D000-memory.dmpFilesize
11MB
-
memory/1096-66-0x00000000024AB000-0x00000000024CA000-memory.dmpFilesize
124KB
-
memory/1516-56-0x0000000002210000-0x00000000022A2000-memory.dmpFilesize
584KB
-
memory/1516-54-0x000000013FE00000-0x000000014001A000-memory.dmpFilesize
2MB
-
memory/1516-57-0x000000001BEF6000-0x000000001BF15000-memory.dmpFilesize
124KB
-
memory/1516-55-0x000000001B9C0000-0x000000001BBAA000-memory.dmpFilesize
1MB
-
memory/1516-69-0x000000001B220000-0x000000001B2F2000-memory.dmpFilesize
840KB
-
memory/1516-78-0x000000001BEF6000-0x000000001BF15000-memory.dmpFilesize
124KB
-
memory/1544-70-0x0000000140000000-0x0000000140098000-memory.dmpFilesize
608KB
-
memory/1544-71-0x0000000140000000-0x0000000140098000-memory.dmpFilesize
608KB
-
memory/1544-73-0x0000000140000000-0x0000000140098000-memory.dmpFilesize
608KB
-
memory/1544-74-0x0000000140000000-0x0000000140098000-memory.dmpFilesize
608KB
-
memory/1544-75-0x0000000140000000-mapping.dmp