Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe
Resource
win10v2004-20221111-en
General
-
Target
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe
-
Size
1.5MB
-
MD5
ed89f4245dbc0d3d6ce217eaf03c7905
-
SHA1
ab19db8237ef88e3fff7f35a98277d618be95005
-
SHA256
9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a
-
SHA512
426e5842df72759a1807fe78f5e2d12d06b70ed7f8cde5f16df1500470db72af076adc92c3abf932eed95a810bac11daaebabff75154de6a772bd01fc5c7eab1
-
SSDEEP
24576:din21YorzjJGRnp110omtDTAuLYiK+sUThY5zuYY0ybi6X27Oj/5VN+X+lzSvCeH:dFYorzjJsnp1107K+Lq5zujjX2G5VkXa
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8i7j46g5v4qvx087804h6wb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\8i7j46g5v4qvx087804h6wb4 = "C:\\ProgramData\\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\\8i7j46g5v4qvx087804h6wb4.exe" 8i7j46g5v4qvx087804h6wb4.exe -
Executes dropped EXE 1 IoCs
pid Process 5028 8i7j46g5v4qvx087804h6wb4.exe -
Loads dropped DLL 1 IoCs
pid Process 5028 8i7j46g5v4qvx087804h6wb4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5028 8i7j46g5v4qvx087804h6wb4.exe 5028 8i7j46g5v4qvx087804h6wb4.exe 5028 8i7j46g5v4qvx087804h6wb4.exe 5028 8i7j46g5v4qvx087804h6wb4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5028 8i7j46g5v4qvx087804h6wb4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5028 8i7j46g5v4qvx087804h6wb4.exe 5028 8i7j46g5v4qvx087804h6wb4.exe 5028 8i7j46g5v4qvx087804h6wb4.exe 5028 8i7j46g5v4qvx087804h6wb4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4684 wrote to memory of 4864 4684 9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe 79 PID 4684 wrote to memory of 4864 4684 9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe 79 PID 4684 wrote to memory of 4864 4684 9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe 79 PID 4864 wrote to memory of 5028 4864 cmd.exe 81 PID 4864 wrote to memory of 5028 4864 cmd.exe 81 PID 4864 wrote to memory of 5028 4864 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe"C:\Users\Admin\AppData\Local\Temp\9413c4ec225a2eb4b877517297e3b98a0cb043ce5c355cf06d9d2931a559957a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exeC:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.data
Filesize254B
MD529bf9df6ec8080465a0ca943ffacedad
SHA1976808f77d83425161ae080dcef7c85b05ebc7cd
SHA256cc8c4d794df2254e51feb25fb75db040102da9ec206e161ab99dd0e3667755a8
SHA5129cc4049ea872c2137ec8082f7061d67f9c5ec1d32f6b1dd6e76f2d228922480c4a9274c6cfb50b1248336bbd50463c3469c62e664f5c55ef5186655c71aedd31
-
C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe
Filesize901KB
MD5b4479909bd3f46e29d8df4a970765282
SHA11bdd7c6a89adfa0f518f5d929bd7df86256df117
SHA25626fe42ac969f3a20ca56acec614c3a33ba8ed37582a684bb4922781e83418fb8
SHA512d9543a05b6f1de92266e7b31c3314242c4855fb6961d3f8b14778cad14c56a6928d2b29fa217f7088f4abedff9aa0c21cdaa83076ba43504b425813b132372c4
-
C:\ProgramData\1f755rdha52f8025aur034bpy6a1q50c3917t96hyb8j1gt92e1898525393e8c7e3zqp66h\8i7j46g5v4qvx087804h6wb4.exe
Filesize901KB
MD5b4479909bd3f46e29d8df4a970765282
SHA11bdd7c6a89adfa0f518f5d929bd7df86256df117
SHA25626fe42ac969f3a20ca56acec614c3a33ba8ed37582a684bb4922781e83418fb8
SHA512d9543a05b6f1de92266e7b31c3314242c4855fb6961d3f8b14778cad14c56a6928d2b29fa217f7088f4abedff9aa0c21cdaa83076ba43504b425813b132372c4
-
Filesize
368KB
MD5428a44d102eb8003421164780a83020c
SHA18eb4cc4ad53c83ab21e487eb59d957bf43e32622
SHA2562cea85f0678a4a763d4b21d0828057ceac4a13e6e5f27003a37c6a14a1f0bd10
SHA5120f7784ae3515f8006e5f312f3e650aa6dd00dd90eb1b4dc3faa2e4a69a84b9af0450017794a3500310dc362d305d0d7d281658bb306ba7ebeb994d332da5cba9
-
Filesize
368KB
MD5428a44d102eb8003421164780a83020c
SHA18eb4cc4ad53c83ab21e487eb59d957bf43e32622
SHA2562cea85f0678a4a763d4b21d0828057ceac4a13e6e5f27003a37c6a14a1f0bd10
SHA5120f7784ae3515f8006e5f312f3e650aa6dd00dd90eb1b4dc3faa2e4a69a84b9af0450017794a3500310dc362d305d0d7d281658bb306ba7ebeb994d332da5cba9