Analysis
-
max time kernel
143s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-02-2023 01:18
Static task
static1
Behavioral task
behavioral1
Sample
76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe
Resource
win10v2004-20230220-en
General
-
Target
76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe
-
Size
622KB
-
MD5
4a35d67996cdcde8da42ba8e40015738
-
SHA1
21342be12a055a2c1caffd73cc7866c81cb3e585
-
SHA256
76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c
-
SHA512
96f3904de25540397b1a499828f1781c943ffba4d42e2028b6ab322dbb3916bc03adf5ca084bf2afa3a90272a9c986e7d11b23e26ab86856225b0d0aef9f8ad2
-
SSDEEP
12288:U/C3Xp1sthiBKo+NJv9B3K6EwC2EQcmowOmA9BRMsrLS3t5r0I1Uu:e+Xp14hiBr+NJDvEwFQBPMqLS3kIC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DSFHJ7.EXEpid process 692 DSFHJ7.EXE -
Loads dropped DLL 6 IoCs
Processes:
RegAsm.exeWerFault.exepid process 2044 RegAsm.exe 2044 RegAsm.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe 268 WerFault.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\DSFHJ7.EXE upx C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE upx C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE upx \Users\Admin\AppData\Roaming\DSFHJ7.EXE upx behavioral1/memory/692-76-0x000000013F480000-0x000000013F5DD000-memory.dmp upx \Users\Admin\AppData\Roaming\DSFHJ7.EXE upx \Users\Admin\AppData\Roaming\DSFHJ7.EXE upx \Users\Admin\AppData\Roaming\DSFHJ7.EXE upx \Users\Admin\AppData\Roaming\DSFHJ7.EXE upx behavioral1/memory/692-81-0x000000013F480000-0x000000013F5DD000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exedescription pid process target process PID 2036 set thread context of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 268 692 WerFault.exe DSFHJ7.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exepid process 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exedescription pid process Token: SeDebugPrivilege 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exeRegAsm.exeDSFHJ7.EXEdescription pid process target process PID 2036 wrote to memory of 1468 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 1468 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 1468 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 1468 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 1468 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 1468 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 1468 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2036 wrote to memory of 2044 2036 76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe RegAsm.exe PID 2044 wrote to memory of 692 2044 RegAsm.exe DSFHJ7.EXE PID 2044 wrote to memory of 692 2044 RegAsm.exe DSFHJ7.EXE PID 2044 wrote to memory of 692 2044 RegAsm.exe DSFHJ7.EXE PID 2044 wrote to memory of 692 2044 RegAsm.exe DSFHJ7.EXE PID 692 wrote to memory of 268 692 DSFHJ7.EXE WerFault.exe PID 692 wrote to memory of 268 692 DSFHJ7.EXE WerFault.exe PID 692 wrote to memory of 268 692 DSFHJ7.EXE WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe"C:\Users\Admin\AppData\Local\Temp\76a794c86b0f80ae8ec3461e05e0fb0fb219e57f7e85ebdae3cc10901a99791c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE"C:\Users\Admin\AppData\Roaming\DSFHJ7.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 692 -s 2844⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\DSFHJ7.EXEFilesize
534KB
MD56abd3d438f8486a139bd53e83d33914f
SHA1126b1a440a8bef3a10c697ea76f33709489380bc
SHA2569c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1
SHA512affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950
-
C:\Users\Admin\AppData\Roaming\DSFHJ7.EXEFilesize
534KB
MD56abd3d438f8486a139bd53e83d33914f
SHA1126b1a440a8bef3a10c697ea76f33709489380bc
SHA2569c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1
SHA512affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950
-
\Users\Admin\AppData\Roaming\DSFHJ7.EXEFilesize
534KB
MD56abd3d438f8486a139bd53e83d33914f
SHA1126b1a440a8bef3a10c697ea76f33709489380bc
SHA2569c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1
SHA512affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950
-
\Users\Admin\AppData\Roaming\DSFHJ7.EXEFilesize
534KB
MD56abd3d438f8486a139bd53e83d33914f
SHA1126b1a440a8bef3a10c697ea76f33709489380bc
SHA2569c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1
SHA512affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950
-
\Users\Admin\AppData\Roaming\DSFHJ7.EXEFilesize
534KB
MD56abd3d438f8486a139bd53e83d33914f
SHA1126b1a440a8bef3a10c697ea76f33709489380bc
SHA2569c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1
SHA512affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950
-
\Users\Admin\AppData\Roaming\DSFHJ7.EXEFilesize
534KB
MD56abd3d438f8486a139bd53e83d33914f
SHA1126b1a440a8bef3a10c697ea76f33709489380bc
SHA2569c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1
SHA512affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950
-
\Users\Admin\AppData\Roaming\DSFHJ7.EXEFilesize
534KB
MD56abd3d438f8486a139bd53e83d33914f
SHA1126b1a440a8bef3a10c697ea76f33709489380bc
SHA2569c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1
SHA512affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950
-
\Users\Admin\AppData\Roaming\DSFHJ7.EXEFilesize
534KB
MD56abd3d438f8486a139bd53e83d33914f
SHA1126b1a440a8bef3a10c697ea76f33709489380bc
SHA2569c2271c16306e1a12d3c9f9b9ccbeeab9b16106f27187c35e33628c9911c09e1
SHA512affff8f3611bb65e4e57731998e45de8a5edab731305b7a6c3f1b545d8369244320b4a3a7b93f108fea2cb60806eaa1e5c922407effad7cf95a4caf806b84950
-
memory/692-76-0x000000013F480000-0x000000013F5DD000-memory.dmpFilesize
1.4MB
-
memory/692-81-0x000000013F480000-0x000000013F5DD000-memory.dmpFilesize
1.4MB
-
memory/2036-54-0x0000000000E90000-0x0000000000F32000-memory.dmpFilesize
648KB
-
memory/2044-64-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2044-62-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2044-61-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2044-75-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2044-58-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2044-60-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2044-59-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2044-57-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2044-56-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB
-
memory/2044-55-0x0000000000400000-0x0000000000497000-memory.dmpFilesize
604KB