Analysis
-
max time kernel
29s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-02-2023 23:26
Static task
static1
Behavioral task
behavioral1
Sample
54ef9fa70e329cdbe55dfccaef21f9c6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
54ef9fa70e329cdbe55dfccaef21f9c6.exe
Resource
win10v2004-20230220-en
General
-
Target
54ef9fa70e329cdbe55dfccaef21f9c6.exe
-
Size
2.6MB
-
MD5
54ef9fa70e329cdbe55dfccaef21f9c6
-
SHA1
697da7932e7b7388c9eb838c10c1856b000cdca8
-
SHA256
8ccff473270017f72b0910ea0404d670cc6c0ebee16977accc7cbcf137ba168b
-
SHA512
c4e2f1afa4920abeace123c76729f14ab6d078e5625868aaa628a35e1dec501bcf382e280015df1e67558662e929c029aa4116eb616522aff6c0ab051ae737b7
-
SSDEEP
49152:5VvvvHIr4Ui00kCOEVB1v5iwc6wMdIpFE/pp:5Vngry00K8B5i2IpFwp
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Drops startup file 1 IoCs
Processes:
54ef9fa70e329cdbe55dfccaef21f9c6.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\update23.ini.lnk 54ef9fa70e329cdbe55dfccaef21f9c6.exe -
Executes dropped EXE 1 IoCs
Processes:
client32.exepid process 556 client32.exe -
Loads dropped DLL 10 IoCs
Processes:
54ef9fa70e329cdbe55dfccaef21f9c6.execlient32.exepid process 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe 556 client32.exe 556 client32.exe 556 client32.exe 556 client32.exe 556 client32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
client32.exedescription pid process Token: SeSecurityPrivilege 556 client32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
client32.exepid process 556 client32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
54ef9fa70e329cdbe55dfccaef21f9c6.exedescription pid process target process PID 1240 wrote to memory of 556 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe client32.exe PID 1240 wrote to memory of 556 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe client32.exe PID 1240 wrote to memory of 556 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe client32.exe PID 1240 wrote to memory of 556 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe client32.exe PID 1240 wrote to memory of 556 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe client32.exe PID 1240 wrote to memory of 556 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe client32.exe PID 1240 wrote to memory of 556 1240 54ef9fa70e329cdbe55dfccaef21f9c6.exe client32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54ef9fa70e329cdbe55dfccaef21f9c6.exe"C:\Users\Admin\AppData\Local\Temp\54ef9fa70e329cdbe55dfccaef21f9c6.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\updatewindows23\client32.exe"C:\Users\Admin\AppData\Roaming\updatewindows23\client32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD5369388ac78ca4ca8a64219cf9aafad4c
SHA1dfa6c01c55ac799f041c65df9a35aba8cf0d8c2d
SHA256c76ee648639406c81469772311c39b46042bf1b91e47d9201908f3cf70407f30
SHA5127d090f033ffc48b870d692877f3804a69dcb1ff61b96936f1ab77bf42b156839bfd787c387bc7d642c732868e3dcd8c0ff3b319f057c0157b5afc6843b302bc5
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
257B
MD59f7d99ff013dd6ff0a47fa22714004d3
SHA1641dd35a0d42bb418a65825e7de2546b26d08a1d
SHA256270814d5ba21237006934b7233a3de045c2310660027660b34647d59c7508141
SHA512b9cd1f929990c77a1cb11d46d29824a85d02b0e5fcc8a14820487af56591e07ac891142c185fcf19b444ba375e88639781244ffe3e150add781045a392d0b503
-
Filesize
100KB
MD5f0d7d2a77eee2b3146405d3ad0d56230
SHA137c323faf58584606ee5847cb9a25346c588f78f
SHA256f043653ab1b8fbe5a33922df5b4fb46797e9694e5fcee807b97cc6aaef650131
SHA512861258b5b97665f649437fd25aadc5dc66e5bc5a87d7482300f9931810f0d89d0ed9c01890cd038daa7c6d2f1850a3208fc20b3c1dc2e588c7688e228a4baade
-
Filesize
3.3MB
MD51274cca13cc5e37ca94d35e5b0673e89
SHA1a8754c94f88273c304bc45a5afd61a383bb52117
SHA256cd5510c8bc7ea60be77ad4aab502ee02d871bf4e917aeeb6921c20eebd9693dd
SHA51252eafa31ee942dc92d0b8f52c12206f6abc1d5fae799b37b371e97c38ce66bd0693263de86b4880748ba1405054701288caf2cd00cd327edc164e1390cf9191c
-
Filesize
101KB
MD5c4f1b50e3111d29774f7525039ff7086
SHA157539c95cba0986ec8df0fcdea433e7c71b724c6
SHA25618df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
SHA512005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
Filesize
101KB
MD5c4f1b50e3111d29774f7525039ff7086
SHA157539c95cba0986ec8df0fcdea433e7c71b724c6
SHA25618df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
SHA512005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
Filesize
962B
MD5279b5834fbd890fb90819b6710e0cc00
SHA19fb75dff6476aab7f2aaa15496b79eb9f1a44073
SHA25608a0519dcc85dd524279c7faab604130e6fd508f504719bb1a29f3f0e4d8b34b
SHA512ede915541925e2b89aa03612a0ba23db2ba9742f7109228b0929883f6c8a0d0eb3a6af4987268729fa72459b3163e09b466c37668aab748bc5ba1eac38059c19
-
Filesize
8KB
MD507b474ab5c503f35873b94cd48d01592
SHA1e6f699d6c021d9d434cc6a4e68516c4c2ac80ddc
SHA256c8911c298f860de85037f8634e8539627f5a1c13b1fffe5568d63612e29b9cd4
SHA512a995b0d1fba6e99dd89afbf5161efc18b0268c001c27155876e642abc8639f79c2c320530039cfa5ec9f6ca10e1d716060b0fb86414245f578f920f11c9bbbc8
-
Filesize
299KB
MD5369388ac78ca4ca8a64219cf9aafad4c
SHA1dfa6c01c55ac799f041c65df9a35aba8cf0d8c2d
SHA256c76ee648639406c81469772311c39b46042bf1b91e47d9201908f3cf70407f30
SHA5127d090f033ffc48b870d692877f3804a69dcb1ff61b96936f1ab77bf42b156839bfd787c387bc7d642c732868e3dcd8c0ff3b319f057c0157b5afc6843b302bc5
-
Filesize
8KB
MD507b474ab5c503f35873b94cd48d01592
SHA1e6f699d6c021d9d434cc6a4e68516c4c2ac80ddc
SHA256c8911c298f860de85037f8634e8539627f5a1c13b1fffe5568d63612e29b9cd4
SHA512a995b0d1fba6e99dd89afbf5161efc18b0268c001c27155876e642abc8639f79c2c320530039cfa5ec9f6ca10e1d716060b0fb86414245f578f920f11c9bbbc8
-
Filesize
3.3MB
MD51274cca13cc5e37ca94d35e5b0673e89
SHA1a8754c94f88273c304bc45a5afd61a383bb52117
SHA256cd5510c8bc7ea60be77ad4aab502ee02d871bf4e917aeeb6921c20eebd9693dd
SHA51252eafa31ee942dc92d0b8f52c12206f6abc1d5fae799b37b371e97c38ce66bd0693263de86b4880748ba1405054701288caf2cd00cd327edc164e1390cf9191c
-
Filesize
101KB
MD5c4f1b50e3111d29774f7525039ff7086
SHA157539c95cba0986ec8df0fcdea433e7c71b724c6
SHA25618df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
SHA512005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
Filesize
101KB
MD5c4f1b50e3111d29774f7525039ff7086
SHA157539c95cba0986ec8df0fcdea433e7c71b724c6
SHA25618df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
SHA512005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
Filesize
101KB
MD5c4f1b50e3111d29774f7525039ff7086
SHA157539c95cba0986ec8df0fcdea433e7c71b724c6
SHA25618df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
SHA512005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
Filesize
101KB
MD5c4f1b50e3111d29774f7525039ff7086
SHA157539c95cba0986ec8df0fcdea433e7c71b724c6
SHA25618df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
SHA512005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
Filesize
101KB
MD5c4f1b50e3111d29774f7525039ff7086
SHA157539c95cba0986ec8df0fcdea433e7c71b724c6
SHA25618df68d1581c11130c139fa52abb74dfd098a9af698a250645d6a4a65efcbf2d
SHA512005db65cedaaccc85525fb3cdab090054bb0bb9cc8c37f8210ec060f490c64945a682b5dd5d00a68ac2b8c58894b6e7d938acaa1130c1cc5667e206d38b942c5
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
100KB
MD5f0d7d2a77eee2b3146405d3ad0d56230
SHA137c323faf58584606ee5847cb9a25346c588f78f
SHA256f043653ab1b8fbe5a33922df5b4fb46797e9694e5fcee807b97cc6aaef650131
SHA512861258b5b97665f649437fd25aadc5dc66e5bc5a87d7482300f9931810f0d89d0ed9c01890cd038daa7c6d2f1850a3208fc20b3c1dc2e588c7688e228a4baade