Analysis
-
max time kernel
43s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/02/2023, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
6e32503be9156b7ca8367937d828fc25c8e842ba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6e32503be9156b7ca8367937d828fc25c8e842ba.exe
Resource
win10v2004-20220812-en
General
-
Target
6e32503be9156b7ca8367937d828fc25c8e842ba.exe
-
Size
11KB
-
MD5
ad4027743e38ce3c5d53f2bd382e02b9
-
SHA1
6e32503be9156b7ca8367937d828fc25c8e842ba
-
SHA256
cb140c285f5cfba6bd9d39e5410edfac0d7fd6cf38f42905a6a069389beb3f9e
-
SHA512
0e44eee10c3ea4b608ead3a8f176b95c443a10642d06a68ef166c1bbe6649049e0e6aa01959606d14440775d15787520b0ca0e33489bf2fad736159968fe9d6c
-
SSDEEP
192:XSrbLCpz9SXRvaSFMclMS6tQUNn3DcUnVwm68Z0nSK6dLSC0lSq:irypz2RvkS4N1nOm6Rnae0q
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 6e32503be9156b7ca8367937d828fc25c8e842ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\HFDF = "C:\\Windows\\system32\\hfdf0527.exe" 6e32503be9156b7ca8367937d828fc25c8e842ba.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\hfdf0527.dll 6e32503be9156b7ca8367937d828fc25c8e842ba.exe File created C:\Windows\SysWOW64\test.sys 6e32503be9156b7ca8367937d828fc25c8e842ba.exe File created C:\Windows\SysWOW64\hfdf0527.exe 6e32503be9156b7ca8367937d828fc25c8e842ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 6e32503be9156b7ca8367937d828fc25c8e842ba.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1288 1960 6e32503be9156b7ca8367937d828fc25c8e842ba.exe 13 PID 1960 wrote to memory of 568 1960 6e32503be9156b7ca8367937d828fc25c8e842ba.exe 28 PID 1960 wrote to memory of 568 1960 6e32503be9156b7ca8367937d828fc25c8e842ba.exe 28 PID 1960 wrote to memory of 568 1960 6e32503be9156b7ca8367937d828fc25c8e842ba.exe 28 PID 1960 wrote to memory of 568 1960 6e32503be9156b7ca8367937d828fc25c8e842ba.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\6e32503be9156b7ca8367937d828fc25c8e842ba.exe"C:\Users\Admin\AppData\Local\Temp\6e32503be9156b7ca8367937d828fc25c8e842ba.exe"2⤵
- Adds policy Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\w1.bat" "3⤵PID:568
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334B
MD5c64f41de8477308fe67aacea133ca379
SHA1eb45d2510d8db13aafc860fb9536d882b540da21
SHA2567e62c3a27bed2dbd8f97b4abecb7cb90ed03c67a8dbcf458f4650a0280be4d59
SHA512b9cf05d6b548cca39e09c15e14f8dc6d20a5453f525ea0544c39ac851bc76222aeb709816a92c6247d50f8e4789a119eb86922d642c3d0fab0c27ac48d36e295