Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-03-2023 14:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
111KB
-
MD5
5b45640a3bd4fdc32df75aa462f5a167
-
SHA1
fdc2b61ca7b5c31ba48155d364b8797990e2eaee
-
SHA256
2e53a6710f04dd84cfd3ac1874a2a61e690568405f192e7cbf8a4df12da334c4
-
SHA512
3f3e86e14f0a09bafd374da2417452bc69741e14c2d4e1a4b208a94e1a2c9cd3a0c4336ec23e9b046bcad051aac8d6f05d4477cb516c3700b27f21e023106963
-
SSDEEP
3072:lb4MOYUuQaS+T8sv8X31OjqOjNhOYRbxqH8QW2zCrAZuRs5:wYUuQaS+T8sv8X31OXN1bgl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 288 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 856 rat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1960 856 WerFault.exe 37 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1948 schtasks.exe 788 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1620 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 604 tasklist.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 856 rat.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 856 rat.exe 856 rat.exe 856 rat.exe 856 rat.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1228 file.exe Token: SeDebugPrivilege 604 tasklist.exe Token: SeDebugPrivilege 856 rat.exe Token: SeDebugPrivilege 856 rat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 856 rat.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1948 1228 file.exe 30 PID 1228 wrote to memory of 1948 1228 file.exe 30 PID 1228 wrote to memory of 1948 1228 file.exe 30 PID 1228 wrote to memory of 288 1228 file.exe 32 PID 1228 wrote to memory of 288 1228 file.exe 32 PID 1228 wrote to memory of 288 1228 file.exe 32 PID 288 wrote to memory of 604 288 cmd.exe 34 PID 288 wrote to memory of 604 288 cmd.exe 34 PID 288 wrote to memory of 604 288 cmd.exe 34 PID 288 wrote to memory of 1564 288 cmd.exe 35 PID 288 wrote to memory of 1564 288 cmd.exe 35 PID 288 wrote to memory of 1564 288 cmd.exe 35 PID 288 wrote to memory of 1620 288 cmd.exe 36 PID 288 wrote to memory of 1620 288 cmd.exe 36 PID 288 wrote to memory of 1620 288 cmd.exe 36 PID 288 wrote to memory of 856 288 cmd.exe 37 PID 288 wrote to memory of 856 288 cmd.exe 37 PID 288 wrote to memory of 856 288 cmd.exe 37 PID 856 wrote to memory of 788 856 rat.exe 39 PID 856 wrote to memory of 788 856 rat.exe 39 PID 856 wrote to memory of 788 856 rat.exe 39 PID 856 wrote to memory of 1960 856 rat.exe 41 PID 856 wrote to memory of 1960 856 rat.exe 41 PID 856 wrote to memory of 1960 856 rat.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"2⤵
- Creates scheduled task(s)
PID:1948
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1FF0.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1FF0.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1228"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:1564
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:1620
-
-
C:\Users\ToxicEye\rat.exe"rat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\ToxicEye\rat.exe"4⤵
- Creates scheduled task(s)
PID:788
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 856 -s 17284⤵
- Program crash
PID:1960
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD58180adedaaee6f0a90ec44865da5f821
SHA1dc17a83b7b76b6bc4432426dd32fbc5abf3c1590
SHA256760e564be2376985aec356120c082c9171c36aede88ecf0d467c35685106ddb8
SHA51250dea08b506a3fb00c80c351182312bfc7deacc86591f4510ba0ecabe345ce665576cc7a9c7bbc21c709144f2094504cedd9c4d5c8e287ff2330f193bca85ee5
-
Filesize
111KB
MD55b45640a3bd4fdc32df75aa462f5a167
SHA1fdc2b61ca7b5c31ba48155d364b8797990e2eaee
SHA2562e53a6710f04dd84cfd3ac1874a2a61e690568405f192e7cbf8a4df12da334c4
SHA5123f3e86e14f0a09bafd374da2417452bc69741e14c2d4e1a4b208a94e1a2c9cd3a0c4336ec23e9b046bcad051aac8d6f05d4477cb516c3700b27f21e023106963
-
Filesize
111KB
MD55b45640a3bd4fdc32df75aa462f5a167
SHA1fdc2b61ca7b5c31ba48155d364b8797990e2eaee
SHA2562e53a6710f04dd84cfd3ac1874a2a61e690568405f192e7cbf8a4df12da334c4
SHA5123f3e86e14f0a09bafd374da2417452bc69741e14c2d4e1a4b208a94e1a2c9cd3a0c4336ec23e9b046bcad051aac8d6f05d4477cb516c3700b27f21e023106963