Analysis
-
max time kernel
140s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-04-2023 18:24
Behavioral task
behavioral1
Sample
ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe
Resource
win10v2004-20230221-en
General
-
Target
ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe
-
Size
10.7MB
-
MD5
5a0aea9ad39380b4852cc8f958bb8f45
-
SHA1
d876777c0ea25ba4e5540a8b35729727a2610563
-
SHA256
ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85
-
SHA512
5f7163c3db716b4692ab189640ce3495164a78a5242bffb5c9d84e80a383a16c5a53a1060fca6707faea31ebc03e705850fb1583d37acf00722c2f7441f7c14b
-
SSDEEP
196608:a+AcBqTG33I2SPmigGJz4m4mJKOJf8bEcAMW4fAUxXL+FCBrEiDRQaCmT3RlGL/i:a+AcBqTG33I2SPmigGJz4m4mJKmoDW4y
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1704-260-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-271-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-272-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-273-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-274-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-275-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-276-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-277-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-278-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-279-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-280-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-281-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-282-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-283-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-284-0x0000000000BE0000-0x0000000002168000-memory.dmp upx behavioral1/memory/1704-285-0x0000000000BE0000-0x0000000002168000-memory.dmp upx -
Enumerates connected drives 3 TTPs 26 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\m: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\x: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\s: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\v: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\a: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\b: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\f: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\h: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\i: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\p: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\E: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\z: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\j: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\k: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\q: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\r: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\t: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\w: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\d: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\e: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\l: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\n: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\o: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\u: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe File opened (read-only) \??\y: ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1704-260-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-271-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-272-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-273-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-274-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-275-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-276-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-277-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-278-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-279-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-280-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-281-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-282-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-283-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-284-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe behavioral1/memory/1704-285-0x0000000000BE0000-0x0000000002168000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1704 ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe"C:\Users\Admin\AppData\Local\Temp\ce42c4cf82ac238c68e6b1567edfc4c1a2c4b91408953f422a7fe9ae2b6faa85.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5a4b8d5a829199d4d65c1971e0b15d36b
SHA1794c696ad22b5ebf5fc1e1a840b6cf9e4e8f44a5
SHA256c7f5d89009386d287afdba334b8cfb3195328e19a1c8f8a26eaca433daa7dccc
SHA512ff96157379873e9292fde902d4da5fcf1fec0000372f69675a3ef4634cb05d94566c9fbf1f7b99427375cc34feae966653fd3160cbd852438451fc77809c1db7
-
Filesize
10KB
MD54726dd39ae688b8fdbb07a637d27148b
SHA17376e621f8f1566889fc40fc2418ff1c295d6e98
SHA2569f1bb2be1e513f3fd5d7cb728aa2e3897b7b28b50556dceadfe55d8e636734d6
SHA51266f9cdc1c3b057d4331b44cae69e4ec3a88feae1c98f749d1e3a04867d20e0fbd12ab624eb153b0036a0a32dae1f312af62147e4004f03efe61929d3f7213fd3
-
Filesize
4KB
MD5b6977798c8d2e2485cd74fcbca56f8c0
SHA11c00498325778f3b381435120a4f7f5774b949ea
SHA2569ae21c75082d420fe0ab9cea2c7636f571fc943f528e297dc34a32dc17a04253
SHA512b92fb8e399cca074fe92fc032f6a09a6388443c7509a2476b1b7f8dc236512af4567b043fe7a82a96c0bb20c2394a9eea15b14591be3077a6fb67fedc3678a01
-
Filesize
9KB
MD5f7a470866849d60aba33f2429fc4052b
SHA1392053b418a716d4dadac22e62250273f4b115b8
SHA256b94225cfa14ed3643af93a90cc93bdf7623f60badeaadd4e9301393fce6ef50e
SHA512b979b3907a142051e18e919e790def542c77aa68449b9d6d08261fa28f637b65258b43708fd36654d585a9cf48407ec64b586dab7e0282eca887c5efb6e30f5e
-
Filesize
2KB
MD51826b9abf61349d24647749f5d25ba35
SHA17fd4c0b04f3de595fd5cafd00ea6c47288ebec9c
SHA256bde2cd4ee0b7186c4e5fef1b54bb7ea16e44799f8c7deff236e21841982b8ada
SHA5122e8e43df88f10489e8b58de0cf3c2249fc21ff484d3cfbf340c780be6080fbf0ac91f55c0a822a633436205f6ef572735fbbdf171857452f64dbc0349b2d1af3
-
Filesize
1KB
MD575f1b945e23f57d509e4187af20d349e
SHA15a6d5d23dabe546930b3535b7f150556fa49319b
SHA256bb928eb8a7a5bb6400e0ba8b677c97da9dc01cd28f0d392b0634d673ba832736
SHA512031285a97de82934d332cfa7f3b722cac94b8335679fbf10a170a4d5765da2dd81112d4fb260277acb84291fda5394daef0a519db4d2c9ed89d283a5bb88dd53
-
Filesize
1KB
MD50e5b6a9f4a509474aa635688345bc6ee
SHA1d0cdac358836debf63ebebd2cc80de1808090cb6
SHA2569b3f8e383b8dad5f0698b58f29251c0fd67ded6ca2077964a587742aeba0b1cb
SHA512ccdf051136a066980e2eac83c3c2fbd6d24ab4df384fd3a02b498a92f0c84d7fa2843993fac74611308f8a0a58e4184bd14375db5c63ced597100661bdecc25d
-
Filesize
1KB
MD580a3eae320107f1ffda4a1276427dd1c
SHA184e384f86188848aa75433a74263065bad57572d
SHA256bb9ceb2023a4c4e311628f036c4b32da33a2819dd8eb363196b3a9e91ea25ccf
SHA512237f1613726251d04b8b9437d82f0da56e7eaa3354996a719faa7aa23b41ccf049786931ce8b877c45a3bdbffa408891b8b977ab9a6af8feab00d190436d09c8
-
Filesize
1KB
MD579e9ab3d7719580559b3ffa2a7fd5f4d
SHA1583ff78cc85be6d4c274df623678d6fb94cabc9d
SHA25658acc4fd903665bcf125016affe3fb94a0372e5cd9746e09c94ea109888e447d
SHA5125620b71821aa7abe92e46c458cf05487e9759c91ff5ccae94fa7de2d94289aeb613ec3a919c9f7f95839dddb3cd9963beeef487618ed9b3805cf2608a4e58a2f
-
Filesize
23KB
MD55b50380f98e3a9db833a00161c000632
SHA15f9853000eb5a7d411362d4b1aec532008947c32
SHA256815f6e6d5bffe2ee35724ffdc9cf75495cb17df44d2d449098bea76c7b20f28a
SHA512042ab635b4e22736e383eca86f66b6160cae416df34535153cafab401afe2b10a1cca18f705940f4dbb5989a804eba409983d2e9eb28306a4db523ea0e5b5ef5
-
Filesize
3KB
MD51837879a9c3298808e90780606a70b1c
SHA17dfb5596c078be2f805e62702ae9b6d9bd63e8c7
SHA256880a9ab802470851a08ab9e5eb285fd0e9d2076025dd487c4c5b197cdea6a95d
SHA512d9c8ecb41cf47508b2928313a11ca25d38cc2184096c1f42927feac81a00b45c3a4c96a3734f0e20051bb17b7c71a13311cedce907e7dbad412898780069f5e8
-
Filesize
2KB
MD51e26e90706fb81774dc9c938d48dd6b5
SHA18949a854e3fd007b3232147c39265ae451407e45
SHA2567dd297734d265214bb12af53c301dfada087eb0156c26ca3860ebb9cb73d7e97
SHA5124f03b1602b0157a6aebff89885992f6e1a01e57f831224a86633f5bbae606b0494d075722742a1ed5c95bb275ee3b11396dc9d46e0f3431ab37dcf90a3680baf
-
Filesize
3KB
MD58c37c5362e2e522458a1b17d3b143e36
SHA12db0ea5cf088eafa61402b398ce73d411f7ad4ba
SHA2569a9113322235ef4dbf80316a55f4ea830699334730f1afaee1bb0031bb5a9b3d
SHA51291c88a8ef5a3142e5d86834578c779e2395518c0c992d3d1e44cfac5e876da939612d98089c81d79c5c6c2af3d4e07f490ff3c785d4241681090ade2232b21fe
-
Filesize
2KB
MD5fca58fc87db0a897c96d4f6468347bc2
SHA19c49b1907ead0b0539e10f871ed8a5f914edd647
SHA256ba81cb333779767048814b21b88f21fa0a51c3f537bc6bea56303a0d882ab109
SHA512a42e285ec4cb15bb6171f0c648b37ff373aef4ea021bf24bc1d07c9e4addc07ff63e4afada41849867d4c5c8a2fdbe47332372a63fe3de537f86f0892e9bef31
-
Filesize
2KB
MD52301ef0110893b4d5d34f7912a90d729
SHA1b1fb199f8d7c09cc4bd529acf4c1787b6a2ffb14
SHA2568af4f377901774dada2e58efd96536d4eae8070bd72c674dc6542653b1fe20ec
SHA5125b9d77897667530bc8c119e502a9795ac5ac5dbaac2c1ba9302fef4e763ff3941f239ae134b17d4c13372f7e8f73b2e50ec1dcdf9aa0edda5e3b4387835b102c
-
Filesize
2KB
MD51007f997f8e431fa9ec23209d6c10382
SHA1dbf165c368cc06af017e7c51306ad81921d64da4
SHA256f89e2c3109fa2b9a32f37cb17c28f4445054964e05c901ad6c726e4982cb939b
SHA512157abc2c54b63fb72471ddb97e24ae14a322e6a85716a2c73c3caa511d48fa3936a156690325f220eebffaf2c7c1e6ef3399196aeecaf69c5d548e28fdfef5af
-
Filesize
2KB
MD5e67a9836b060469626b01d038bd2f726
SHA1659f56c595b8f804bba3e0bb910e0c1e2f8c6686
SHA2561e389f2c357e3d58b6d1449bb9c19b0533f0251f4a77e66004101a6a354ba1d0
SHA51290aa8f56dbd86390202fa4a6daf35b8d9db65c6e24cbf7261771d40b33ee6b3c4e11da2d972cac9cea365990a9e27619c604edc9ba55dad92fe7eefdd716de0f
-
Filesize
1KB
MD57db8a6781b8d0f39d4281a4a4c67b9ab
SHA1a7bbd8af5afb3e0b0f34d0a078070182df7662c0
SHA256d718926d5300285fe26b077fb246bffc1a4f02a62401a262c2ee7de574d5a006
SHA512ddc45ffb1265259ec77b20dfc23d098b7b46323bfd628dab5caf8485a4129f79b64c637bb856230d895bfea16df451bd63136b460d402abd35c91608cac8d932
-
Filesize
2KB
MD53fe1adae7addc11f5888bec575cf1ef9
SHA110a50cacdeebcace66f166fcaa9491cd2eee0a78
SHA2565537bc37f4ec023810bf5c537283d9164fe36a870367698f8d0b7e2e70333fc6
SHA5122482532e3f84f6ea10c8ff2ed4165ee7f242487e6f79514828fd19204412b87ba8c5f1e166de775bc96526a79e4852e6f1655c9d2c3205d173d504adf5d864de
-
Filesize
8KB
MD5b831c4230e9801e498a1ac57ec343a85
SHA1fb105d1bc817bb3ec0287ecd031098ce79114d6a
SHA2566c45929128601e4a4090519093489d848cd2a0cc26d10d94659a3d996a9ebfe5
SHA51247a887a381ccfa82cea4f1e673e98cc0b44f6d5752f28877a523c7afc4a5c6d30dacdd61f4cf2ccc9a5cf379d1cd64332bcc8bb0c6762e8c6d73bcf2432d1634
-
Filesize
44KB
MD5e38eb9c352bfd72cc9ae7a9c4aecd996
SHA1523fd0f7a88c8cb77ad64474139bfa456b0ba049
SHA256ab148a99f346c62f3c5e5f14c4a5ef18c2ccbe0a2d348b57926b903546027bb4
SHA51274deebcb21e2863b7b47ad0672ee69982d534c0c27b70eaf9d6608e90e85844121e3d0121faa4ad99641baf9dd31872affd9a8f39850b2c771de848ca7e8b051
-
Filesize
2KB
MD523ac5c58ef93af3da836bf31ce5ec5eb
SHA10b89dd5fa792e28f2a01a11cfd0277bdf2551bff
SHA2563f0ec6c99ed470723d7171e5d6b0d13e410db9bd23dc801076a63a2530b7242b
SHA512c037e04ef792ba040772e143905ae7157d1279fd8cb3ad9a1a827ef390e47bd56fc91b0e19a6fcacabbad199496b005743d794fded98d240c29e11e3b1b55f74
-
Filesize
1KB
MD52a47f675c825acbd91323b7346c53ef8
SHA1b155070001f256a1424584a267b4b2f9ad0c205b
SHA256c09132259cf2c385350295745308c10eb1d5843eaadbe41aed58c42fbffcab7f
SHA512b3589a291166ecfe2b8ec9ce0e34746ba2aecc615f5d6111903a7be49e1e1fa0b589235d7d1c41bd96748203e3cbb6d2fac8a4cfc796ec2eeeae56f6b0fb7be0