Analysis
-
max time kernel
149s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02/04/2023, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
BluescreenSimulator.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BluescreenSimulator.exe
Resource
win10v2004-20230220-en
General
-
Target
BluescreenSimulator.exe
-
Size
435KB
-
MD5
c729d1244f267a4a9ee8d565b9d3d973
-
SHA1
6a2990aef82674312751d68737f19309e0a06504
-
SHA256
31e1a16d982e4415d8161baf6817038b8dee191c996d5470338026b7f9fcce1f
-
SHA512
a935bfdf0c46a7e1bb2276731374227c4ff01e1fb9813e458d3b110a50c563fd4ab38628ec81044ab927b34e90f39309b29cac94528358b5662181436ee93146
-
SSDEEP
6144:uPbYJ+oq8+Lf6b1gZjBfyZG4SaGQSZcFhQ9akOJe:uPbRKcLNkkOE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 572 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 572 AUDIODG.EXE Token: 33 572 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 572 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1044 MSASCui.exe 1044 MSASCui.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1992 BluescreenSimulator.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1296 1992 BluescreenSimulator.exe 30 PID 1992 wrote to memory of 1296 1992 BluescreenSimulator.exe 30 PID 1992 wrote to memory of 1296 1992 BluescreenSimulator.exe 30 PID 1296 wrote to memory of 1348 1296 iexpress.exe 31 PID 1296 wrote to memory of 1348 1296 iexpress.exe 31 PID 1296 wrote to memory of 1348 1296 iexpress.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\BluescreenSimulator.exe"C:\Users\Admin\AppData\Local\Temp\BluescreenSimulator.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\iexpress.exe"C:\Windows\system32\iexpress.exe" /N C:\Users\Admin\AppData\Local\Temp\\optionfile.SED2⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\makecab.exeC:\Windows\system32\makecab.exe /f "C:\Users\Admin\AppData\Local\Temp\\~h2bclh40.dzs.DDF"3⤵PID:1348
-
-
-
C:\Program Files\Windows Defender\MSASCui.exe"C:\Program Files\Windows Defender\MSASCui.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:1044
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:276
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xd01⤵
- Suspicious use of AdjustPrivilegeToken
PID:572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
788B
MD582419f1eb063f6f5b08839cd3944f0ab
SHA180b2e8738d51772ce7e296f9701ebdf17f389acb
SHA256012690fb257d3355d1d3f6d1fcdf12177d16c048c763295870bc5a8ea1557366
SHA512a91e35a6e21df62dd9458944c94fcc2b4455db6627a24440d02734da86a973397231470ac974198ef8efeb99e2f4086fa527cb5c0d49f44ae6e39fc98ef6ddc6
-
Filesize
92KB
MD514fd83377396c086097ff875b7a56df6
SHA12e1bf7f99fb8909adcf831e86938c5b6ab6a6fdc
SHA2563719fc0c89af502e2141c3fefd752f49ef70ec27c4332eaa3fa002f7b503ea27
SHA5126ab7493a8704ff15d20c4efe9f3e13c4ba5a731a568954d9a67a0c4eaf9247bbc9f4a50c95ce86a5e23ab3e8f199bff16af0acdfc04d9d2867b1f3e18ba5af20
-
Filesize
862B
MD5d29feb6e2151604557f7bf8f5e716e9f
SHA14c7d5b33aad5cf0be1f6aa5cb2ff7fa423e2b5e6
SHA256f44eae6cf93ad49923431318677e92f073077cde72a6572647309eef599ab308
SHA512e07f064eceba5ff30b1e0928683e6a31768c71dc8f938f52e92440d367b5400ca685520e4e00fdb2747dc0871909a5c3a6442986328850c7b133ca96fba22cd6
-
Filesize
283B
MD5f08dc71e6f1cd97027671bf006648f71
SHA12c8f5fafe0825dd3e4705792052b10db0b5b6ef0
SHA256d92bf35a64f0d3f1a7807f45977979cf95e79be4776cf86149c2704f6d130049
SHA51219ebc979ee3b9e22a365d27746cee773a9a438ccd2ded9d36a3d3b64646d5ccb6f973e225fb28674c47128c09ec710088c7bf26672980deaa268985dbadb73ee
-
Filesize
1KB
MD5ce5bf320d6d8a1f3bc823f7fa172235a
SHA1f6835c0bce9df8c20b37f881bce0502e1e5aa53d
SHA256bd171d171581cc7067f179719b4d13fe3c520a0a6b23653c29465bb271d2ce22
SHA51244304e8d935efa71b202f45ef738fec053799e816fa2cdee9ff17c8a8c6602345ca30d2c9d94e04057bef5ace455a787817317696025ea1e28786f019da59753