Analysis
-
max time kernel
11s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
01-11-2023 20:19
Behavioral task
behavioral1
Sample
Ransomware.RedBoot.zip
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Ransomware.RedBoot.zip
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20231025-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20231020-en
Errors
General
-
Target
1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe
-
Size
1.2MB
-
MD5
e0340f456f76993fc047bc715dfdae6a
-
SHA1
d47f6f7e553c4bc44a2fe88c2054de901390b2d7
-
SHA256
1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887
-
SHA512
cac10c675d81630eefca49b2ac4cc83f3eb29115ee28a560db4d6c33f70bf24980e48bb48ce20375349736e3e6b23a1ca504b9367917328853fffc5539626bbc
-
SSDEEP
24576:/4GHnhIzOasqUgEOr69/BRH7dCibu+XoAX0eOTva49ttrSpt81ekHPyWe:AshdasJgEOrGBRxCihH7OO49rveMG
Malware Config
Signatures
-
Renames multiple (124) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 3 IoCs
pid Process 2688 protect.exe 2804 assembler.exe 2812 overwrite.exe -
Loads dropped DLL 5 IoCs
pid Process 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe -
resource yara_rule behavioral3/memory/860-0-0x0000000000080000-0x000000000030E000-memory.dmp upx behavioral3/memory/860-173-0x0000000000080000-0x000000000030E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 overwrite.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral3/files/0x0007000000015c51-21.dat autoit_exe behavioral3/files/0x0007000000015c51-24.dat autoit_exe behavioral3/files/0x0007000000015c51-28.dat autoit_exe behavioral3/memory/860-173-0x0000000000080000-0x000000000030E000-memory.dmp autoit_exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe 2688 protect.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe Token: 9799832790954471112 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe Token: 55777468977794520 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 860 wrote to memory of 2688 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 28 PID 860 wrote to memory of 2688 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 28 PID 860 wrote to memory of 2688 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 28 PID 860 wrote to memory of 2688 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 28 PID 860 wrote to memory of 2804 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 29 PID 860 wrote to memory of 2804 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 29 PID 860 wrote to memory of 2804 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 29 PID 860 wrote to memory of 2804 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 29 PID 860 wrote to memory of 2812 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 31 PID 860 wrote to memory of 2812 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 31 PID 860 wrote to memory of 2812 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 31 PID 860 wrote to memory of 2812 860 1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe"C:\Users\Admin\AppData\Local\Temp\1001a8c7f33185217e6e1bdbb8dba9780d475da944684fb4bf1fc04809525887.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\15989964\protect.exe"C:\Users\Admin\15989964\protect.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Users\Admin\15989964\assembler.exe"C:\Users\Admin\15989964\assembler.exe" -f bin "C:\Users\Admin\15989964\boot.asm" -o "C:\Users\Admin\15989964\boot.bin"2⤵
- Executes dropped EXE
PID:2804
-
-
C:\Users\Admin\15989964\overwrite.exe"C:\Users\Admin\15989964\overwrite.exe" "C:\Users\Admin\15989964\boot.bin"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2812
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2020
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
589KB
MD57e3cea1f686207563c8369f64ea28e5b
SHA1a1736fd61555841396b0406d5c9ca55c4b6cdf41
SHA2562a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2
SHA5124629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3
-
Filesize
589KB
MD57e3cea1f686207563c8369f64ea28e5b
SHA1a1736fd61555841396b0406d5c9ca55c4b6cdf41
SHA2562a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2
SHA5124629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3
-
Filesize
825B
MD5def1219cfb1c0a899e5c4ea32fe29f70
SHA188aedde59832576480dfc7cd3ee6f54a132588a8
SHA25691e74c438099172b057bedf693d877bd08677d5f2173763986be4974c0970581
SHA5121e735d588cb1bb42324eaff1b9190ec6a8254f419d1ba4a13d03716ff5c102a335532b573a5befb08da90586e5670617066564ef9872f8c415b9a480836df423
-
Filesize
512B
MD590053233e561c8bf7a7b14eda0fa0e84
SHA116a7138387f7a3366b7da350c598f71de3e1cde2
SHA256a760d8bc77ad8c0c839d4ef162ce44d5897af6fa84e0cc05ecc0747759ea76c2
SHA51263fda509cd02fd9d1374435f95515bc74f1ca8a9650b87d2299f8eee3a1c5a41b1cb8a4e1360c75f876f1dae193fdf4a96eba244683308f34d64d7ce37af2bb4
-
Filesize
288KB
MD5bc160318a6e8dadb664408fb539cd04b
SHA14b5eb324eebe3f84e623179a8e2c3743ccf32763
SHA256f2bc5886b0f189976a367a69da8745bf66842f9bba89f8d208790db3dad0c7d2
SHA51251bc090f2821c57d94cfe4399b1f372a68d2811ea0b87d1ac1d6cf8ae39b167038ac21c471b168f1d19c6b213762024abb7e9e5ca311b246b46af0888289e46c
-
Filesize
288KB
MD5bc160318a6e8dadb664408fb539cd04b
SHA14b5eb324eebe3f84e623179a8e2c3743ccf32763
SHA256f2bc5886b0f189976a367a69da8745bf66842f9bba89f8d208790db3dad0c7d2
SHA51251bc090f2821c57d94cfe4399b1f372a68d2811ea0b87d1ac1d6cf8ae39b167038ac21c471b168f1d19c6b213762024abb7e9e5ca311b246b46af0888289e46c
-
Filesize
837KB
MD5fd414666a5b2122c3d9e3e380cf225ed
SHA1de139747b42a807efa8a2dcc1a8304f9a29b862d
SHA256e61a8382f7293e40cb993ddcbcaa53a4e5f07a3d6b6a1bfe5377a1a74a8dcac6
SHA5129ab2163d7deff29c202ed88dba36d5b28f6c67e647a0cadb3d03cc725796e19e5f298c04b1c8523d1d1ee4307e1a5d6f8156fa4021627d6ca1bbd0830695ae05
-
Filesize
837KB
MD5fd414666a5b2122c3d9e3e380cf225ed
SHA1de139747b42a807efa8a2dcc1a8304f9a29b862d
SHA256e61a8382f7293e40cb993ddcbcaa53a4e5f07a3d6b6a1bfe5377a1a74a8dcac6
SHA5129ab2163d7deff29c202ed88dba36d5b28f6c67e647a0cadb3d03cc725796e19e5f298c04b1c8523d1d1ee4307e1a5d6f8156fa4021627d6ca1bbd0830695ae05
-
Filesize
589KB
MD57e3cea1f686207563c8369f64ea28e5b
SHA1a1736fd61555841396b0406d5c9ca55c4b6cdf41
SHA2562a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2
SHA5124629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3
-
Filesize
589KB
MD57e3cea1f686207563c8369f64ea28e5b
SHA1a1736fd61555841396b0406d5c9ca55c4b6cdf41
SHA2562a5305369edb9c2d7354b2f210e91129e4b8c546b0adf883951ea7bf7ee0f2b2
SHA5124629bc32094bdb030e6c9be247068e7295599203284cb95921c98fcbe3ac60286670be7e5ee9f0374a4017286c7af9db211bd831e3ea871d31a509d7bbc1d6a3
-
Filesize
288KB
MD5bc160318a6e8dadb664408fb539cd04b
SHA14b5eb324eebe3f84e623179a8e2c3743ccf32763
SHA256f2bc5886b0f189976a367a69da8745bf66842f9bba89f8d208790db3dad0c7d2
SHA51251bc090f2821c57d94cfe4399b1f372a68d2811ea0b87d1ac1d6cf8ae39b167038ac21c471b168f1d19c6b213762024abb7e9e5ca311b246b46af0888289e46c
-
Filesize
288KB
MD5bc160318a6e8dadb664408fb539cd04b
SHA14b5eb324eebe3f84e623179a8e2c3743ccf32763
SHA256f2bc5886b0f189976a367a69da8745bf66842f9bba89f8d208790db3dad0c7d2
SHA51251bc090f2821c57d94cfe4399b1f372a68d2811ea0b87d1ac1d6cf8ae39b167038ac21c471b168f1d19c6b213762024abb7e9e5ca311b246b46af0888289e46c
-
Filesize
837KB
MD5fd414666a5b2122c3d9e3e380cf225ed
SHA1de139747b42a807efa8a2dcc1a8304f9a29b862d
SHA256e61a8382f7293e40cb993ddcbcaa53a4e5f07a3d6b6a1bfe5377a1a74a8dcac6
SHA5129ab2163d7deff29c202ed88dba36d5b28f6c67e647a0cadb3d03cc725796e19e5f298c04b1c8523d1d1ee4307e1a5d6f8156fa4021627d6ca1bbd0830695ae05