Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe
Resource
win7-20221111-en
General
-
Target
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe
-
Size
4.8MB
-
MD5
94a2ebdbfca94ca574691295689b6b9c
-
SHA1
92fff5c4d9f2a4427a3b5317b3391d40197f5f6a
-
SHA256
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2
-
SHA512
6dc1b78178e31219fa02635879b928622fa40bb7218dcf4cacc5490f47a25060c645ee21b4d0e72b32f25a82928ac43138b08faceba2a195d84cfeb5979a3675
-
SSDEEP
98304:lRA8Y/PdoOGmGHpmxf42MwZMHGI0T4Nu4lfPGb/wJGo+cvw:TAB1h6e42MW4C4M4Jeb6R
Malware Config
Extracted
bitrat
1.34
193.239.147.77:6505
-
communication_password
c398335f85d477cb4802c03bad3916fd
-
tor_process
tor
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exepid process 1776 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe 1776 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe 1776 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe 1776 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exedescription pid process target process PID 772 set thread context of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exedescription pid process Token: SeDebugPrivilege 1776 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe Token: SeShutdownPrivilege 1776 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exepid process 1776 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe 1776 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exedescription pid process target process PID 772 wrote to memory of 1748 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe schtasks.exe PID 772 wrote to memory of 1748 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe schtasks.exe PID 772 wrote to memory of 1748 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe schtasks.exe PID 772 wrote to memory of 1748 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe schtasks.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe PID 772 wrote to memory of 1776 772 de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe"C:\Users\Admin\AppData\Local\Temp\de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EExmhb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9A8C.tmp"2⤵
- Creates scheduled task(s)
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe"C:\Users\Admin\AppData\Local\Temp\de070619366a56d4a3ae1718712a09a8523f6346a50f306d1a0d173dd2c9aee2.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50aad263df4e5f31d7c60a49fc87a9241
SHA1a7e1ff528ccf2bebb1a408ae03edff7f4a1421b3
SHA256d762ba7da1b1526085f23099d44b11ca82a1568de1966d8237caa71d93a9c2db
SHA5128e88caef29efedd916013367eb16e60cdd01c4379e0e4e451456c7299d23519cee2d54a44e3b33f9e0271bd3295c8c856d66f16cd631de7e8c0a773c425a9921