Analysis
-
max time kernel
103s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-03-2023 09:56
Static task
static1
Behavioral task
behavioral1
Sample
e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe
Resource
win10v2004-20230220-en
General
-
Target
e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe
-
Size
1.8MB
-
MD5
048f86a3bf0f6b65184c677e0a1d1ed1
-
SHA1
7b8d29706d9e6a2ead55478d0e532e3a641d76ce
-
SHA256
e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594
-
SHA512
0bebc9a6f3b39a99638bf262921a362a79ab541712aa1d1b954f14f7d38d82df2a8999216fef52dbace9b432a518dc5ce916aac8099a5c12ab86a1d0de2f891b
-
SSDEEP
24576:5642Vz9WVF/eOroWm9V4spl6SiYxyo6jjHwxMH5F3FqYUzLx6jR2u:QzQVpeO0pwSiY164kFnUzLx6jR2
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node\CLSID e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node\CLSID\{XD46JLD7-2644-5dhj-9876-JK8kSkw40SCU} e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node\CLSID\{XD46JLD7-2644-5dhj-9876-JK8kSkw40SCU}\bosskeynew\Ct = "MQ==" e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node\CLSID\{XD46JLD7-2644-5dhj-9876-JK8kSkw40SCU}\bosskeynew\T = "MjAyMy0wMy0xOCAwOTo1NjoxNA==" e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node\CLSID\{XD46JLD7-2644-5dhj-9876-JK8kSkw40SCU}\bosskeynew e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe Token: SeDebugPrivilege 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe -
Suspicious use of SetWindowsHookEx 56 IoCs
pid Process 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe 3992 e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe"C:\Users\Admin\AppData\Local\Temp\e7682e47601da408e0c375ed9403287a21a25b5818d8526b3afa1dd5fcdeb594.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5f6c314a9fba4693d24ef384cea7dc671
SHA19f813d98b6339d31087f393bf05d003457846f1e
SHA256fcf90df47e0d57958569e714f3c38090f6739df12ee6a5c1e95c8d0d81b56870
SHA51275510d1904347129033a13b071d5bc64b9d2c0950c996d609e05b0f5413f7fd760312ffe7ffebf9318ab7d473224a8ad37230fa0bb1a48a7e4161cf5ae18b1b3