Overview
overview
10Static
static
38200755cbe...33.exe
windows7-x64
88200755cbe...33.exe
windows10-2004-x64
829c7e87350...5b.exe
windows7-x64
129c7e87350...5b.exe
windows10-2004-x64
149cccd30a5...90.exe
windows7-x64
149cccd30a5...90.exe
windows10-2004-x64
1b17911ddea...82.exe
windows7-x64
1b17911ddea...82.exe
windows10-2004-x64
102ca4397da...51.exe
windows7-x64
102ca4397da...51.exe
windows10-2004-x64
1022aeb126d...74.exe
windows7-x64
9022aeb126d...74.exe
windows10-2004-x64
9smb-7teux2sm.exe
windows7-x64
9smb-7teux2sm.exe
windows10-2004-x64
9smb-onil0o36.exe
windows7-x64
9smb-onil0o36.exe
windows10-2004-x64
9malware-sa...ab.exe
windows7-x64
10malware-sa...ab.exe
windows10-2004-x64
10malware-sa...1).exe
windows7-x64
6malware-sa...1).exe
windows10-2004-x64
6malware-sa...n.xlsx
windows7-x64
1malware-sa...n.xlsx
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
29c7e87350cb03428fc108b03856095b.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
29c7e87350cb03428fc108b03856095b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
49cccd30a564410d1f9bbce89fa15890.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
49cccd30a564410d1f9bbce89fa15890.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
b17911ddeab973db51362721c940d882.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
b17911ddeab973db51362721c940d882.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
022aeb126d2d80e683f7f2a3ee920874.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
022aeb126d2d80e683f7f2a3ee920874.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
smb-7teux2sm.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
smb-7teux2sm.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
smb-onil0o36.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
smb-onil0o36.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
malware-samples-master/Ransomware/Grandcrab/grandcab.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
malware-samples-master/Ransomware/Grandcrab/grandcab.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
malware-samples-master/Ransomware/Petya/4c1dc737915d76b7ce579abddaba74ead6fdb5b519a1ea45308b8c49b950655c (1).exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
malware-samples-master/Ransomware/Petya/4c1dc737915d76b7ce579abddaba74ead6fdb5b519a1ea45308b8c49b950655c (1).exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
malware-samples-master/mitre-attack/Emotet+Trickbot_comparison.xlsx
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
malware-samples-master/mitre-attack/Emotet+Trickbot_comparison.xlsx
Resource
win10v2004-20240226-en
General
-
Target
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe
-
Size
1.4MB
-
MD5
f2e1d236c5d2c009e1749fc6479a9ede
-
SHA1
262c22ffd66c33da641558f3da23f7584881a782
-
SHA256
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233
-
SHA512
3b3174ac17e377028accf1ebfd6bd6ae97fc99c4e7814f8ad0fe707dc77d757f26d667333efb495a9b9768d49672737233c88d7a50b4dc81ad170f068ad95cc1
-
SSDEEP
24576:6EpKGrwKydag/jU7IZK8LNmf2+r+eauoUWg6ye2tX9t5WR4MJh:6nGrwKtg7U7I88Zi2/xxyeAt06a
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 644 netsh.exe 3996 netsh.exe 1432 netsh.exe 4016 netsh.exe -
Stops running service(s) 3 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 icanhazip.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\id.txt wuauser.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5108 sc.exe 4008 sc.exe -
Kills process with taskkill 7 IoCs
pid Process 3468 taskkill.exe 656 taskkill.exe 3952 taskkill.exe 1516 taskkill.exe 1956 taskkill.exe 5008 taskkill.exe 4544 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe 4260 wuauser.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 656 taskkill.exe Token: SeDebugPrivilege 3952 taskkill.exe Token: SeDebugPrivilege 1516 taskkill.exe Token: SeDebugPrivilege 1956 taskkill.exe Token: SeDebugPrivilege 5008 taskkill.exe Token: SeDebugPrivilege 4544 taskkill.exe Token: SeDebugPrivilege 3468 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 336 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 89 PID 3232 wrote to memory of 336 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 89 PID 3232 wrote to memory of 336 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 89 PID 336 wrote to memory of 656 336 cmd.exe 91 PID 336 wrote to memory of 656 336 cmd.exe 91 PID 336 wrote to memory of 656 336 cmd.exe 91 PID 3232 wrote to memory of 3056 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 94 PID 3232 wrote to memory of 3056 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 94 PID 3232 wrote to memory of 3056 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 94 PID 3056 wrote to memory of 3952 3056 cmd.exe 96 PID 3056 wrote to memory of 3952 3056 cmd.exe 96 PID 3056 wrote to memory of 3952 3056 cmd.exe 96 PID 3232 wrote to memory of 3492 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 101 PID 3232 wrote to memory of 3492 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 101 PID 3232 wrote to memory of 3492 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 101 PID 3492 wrote to memory of 5108 3492 cmd.exe 103 PID 3492 wrote to memory of 5108 3492 cmd.exe 103 PID 3492 wrote to memory of 5108 3492 cmd.exe 103 PID 3232 wrote to memory of 4040 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 104 PID 3232 wrote to memory of 4040 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 104 PID 3232 wrote to memory of 4040 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 104 PID 4040 wrote to memory of 4008 4040 cmd.exe 106 PID 4040 wrote to memory of 4008 4040 cmd.exe 106 PID 4040 wrote to memory of 4008 4040 cmd.exe 106 PID 3232 wrote to memory of 2648 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 107 PID 3232 wrote to memory of 2648 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 107 PID 3232 wrote to memory of 2648 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 107 PID 2648 wrote to memory of 4440 2648 cmd.exe 109 PID 2648 wrote to memory of 4440 2648 cmd.exe 109 PID 2648 wrote to memory of 4440 2648 cmd.exe 109 PID 3232 wrote to memory of 3892 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 110 PID 3232 wrote to memory of 3892 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 110 PID 3232 wrote to memory of 3892 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 110 PID 3892 wrote to memory of 1572 3892 cmd.exe 112 PID 3892 wrote to memory of 1572 3892 cmd.exe 112 PID 3892 wrote to memory of 1572 3892 cmd.exe 112 PID 3232 wrote to memory of 2336 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 113 PID 3232 wrote to memory of 2336 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 113 PID 3232 wrote to memory of 2336 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 113 PID 2336 wrote to memory of 2148 2336 cmd.exe 115 PID 2336 wrote to memory of 2148 2336 cmd.exe 115 PID 2336 wrote to memory of 2148 2336 cmd.exe 115 PID 3232 wrote to memory of 4552 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 116 PID 3232 wrote to memory of 4552 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 116 PID 3232 wrote to memory of 4552 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 116 PID 4552 wrote to memory of 4312 4552 cmd.exe 118 PID 4552 wrote to memory of 4312 4552 cmd.exe 118 PID 4552 wrote to memory of 4312 4552 cmd.exe 118 PID 3232 wrote to memory of 1052 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 119 PID 3232 wrote to memory of 1052 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 119 PID 3232 wrote to memory of 1052 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 119 PID 1052 wrote to memory of 2572 1052 cmd.exe 121 PID 1052 wrote to memory of 2572 1052 cmd.exe 121 PID 1052 wrote to memory of 2572 1052 cmd.exe 121 PID 3232 wrote to memory of 3864 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 122 PID 3232 wrote to memory of 3864 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 122 PID 3232 wrote to memory of 3864 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 122 PID 3864 wrote to memory of 4432 3864 cmd.exe 124 PID 3864 wrote to memory of 4432 3864 cmd.exe 124 PID 3864 wrote to memory of 4432 3864 cmd.exe 124 PID 3232 wrote to memory of 4344 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 127 PID 3232 wrote to memory of 4344 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 127 PID 3232 wrote to memory of 4344 3232 8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe 127 PID 4260 wrote to memory of 1420 4260 wuauser.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe"C:\Users\Admin\AppData\Local\Temp\8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im hdmanager.exe2⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im hdmanager.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im mmc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mmc.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop WELM2⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\sc.exesc stop WELM3⤵
- Launches sc.exe
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete WELM2⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\sc.exesc delete WELM3⤵
- Launches sc.exe
PID:4008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh ipsec static add policy name=netbc2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=netbc3⤵PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh ipsec static add filterlist name=block2⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filterlist name=block3⤵PID:1572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh ipsec static add filteraction name=block action=block2⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=block action=block3⤵PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh ipsec static add filter filterlist=block any srcmask=32 srcport=0 dstaddr=me dstport=445 protocol=tcp description=4452⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=block any srcmask=32 srcport=0 dstaddr=me dstport=445 protocol=tcp description=4453⤵PID:4312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh ipsec static add rule name=block policy=netbc filterlist=block filteraction=block2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=block policy=netbc filterlist=block filteraction=block3⤵PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh ipsec static set policy name=netbc assign=y2⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=netbc assign=y3⤵PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im msiexev.exe2⤵PID:4344
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im msiexev.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall delete rule name="Chrome"2⤵PID:1076
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Chrome"3⤵
- Modifies Windows Firewall
PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall delete rule name="Windriver"2⤵PID:3692
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall delete rule name="Windriver"3⤵
- Modifies Windows Firewall
PID:4016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Chrome" dir=in program="%PROGRAMFILES%\Google\Chrome\Application\chrome.txt" action=allow2⤵PID:1508
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Chrome" dir=in program="C:\Program Files (x86)\Google\Chrome\Application\chrome.txt" action=allow3⤵
- Modifies Windows Firewall
PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Windriver" dir=in program="%PROGRAMFILES%\Hardware Driver Management\windriver.exe" action=allow2⤵PID:4300
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="Windriver" dir=in program="C:\Program Files (x86)\Hardware Driver Management\windriver.exe" action=allow3⤵
- Modifies Windows Firewall
PID:3996
-
-
-
C:\Windows\Fonts\wuauser.exeC:\Windows\Fonts\wuauser.exe --server1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im hdmanager.exe2⤵PID:1420
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im hdmanager.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im hdmanager.exe2⤵PID:4364
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im hdmanager.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im hdmanager.exe2⤵PID:2228
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im hdmanager.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im hdmanager.exe2⤵PID:4516
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im hdmanager.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-