Resubmissions
28/08/2020, 12:47
200828-nd915gcv5n 828/08/2020, 12:45
200828-q7w77zyk92 828/08/2020, 12:39
200828-h3kmc18276 8Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
28/08/2020, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
myfile.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
myfile.exe
Resource
win10v200722
0 signatures
0 seconds
General
-
Target
myfile.exe
-
Size
4.3MB
-
MD5
0a438448cebd370318b5294775e2405c
-
SHA1
60abd37bf94ee406653af60e5b72f1f69f646308
-
SHA256
1e40bce6e476e4c0485b3f813cff5d493b1e07f52a89b56a31765529b809ea33
-
SHA512
dc21a068d6aa3ce93a399d2b636a4dc17fd9b2f60c921eaadaef4eb0049c4ef5d1c09479c906660d0fa7bb7e688cdae54a36d9e73e35ac209e469a862c992976
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3100 HexInformation.exe 2084 HexDecryptor.exe 2516 HexLocker.exe -
Enumerates connected drives 3 TTPs
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wl.jpg" HexLocker.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\Desktop HexLocker.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 7ec5f97d487dd601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 892 svchost.exe Token: SeCreatePagefilePrivilege 892 svchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2896 3056 myfile.exe 73 PID 3056 wrote to memory of 2896 3056 myfile.exe 73 PID 2896 wrote to memory of 1468 2896 cmd.exe 76 PID 2896 wrote to memory of 1468 2896 cmd.exe 76 PID 2896 wrote to memory of 3856 2896 cmd.exe 77 PID 2896 wrote to memory of 3856 2896 cmd.exe 77 PID 2896 wrote to memory of 1732 2896 cmd.exe 78 PID 2896 wrote to memory of 1732 2896 cmd.exe 78 PID 2896 wrote to memory of 3204 2896 cmd.exe 79 PID 2896 wrote to memory of 3204 2896 cmd.exe 79 PID 2896 wrote to memory of 3436 2896 cmd.exe 80 PID 2896 wrote to memory of 3436 2896 cmd.exe 80 PID 2896 wrote to memory of 3100 2896 cmd.exe 81 PID 2896 wrote to memory of 3100 2896 cmd.exe 81 PID 2896 wrote to memory of 3100 2896 cmd.exe 81 PID 2896 wrote to memory of 2084 2896 cmd.exe 82 PID 2896 wrote to memory of 2084 2896 cmd.exe 82 PID 2896 wrote to memory of 2084 2896 cmd.exe 82 PID 2896 wrote to memory of 2516 2896 cmd.exe 84 PID 2896 wrote to memory of 2516 2896 cmd.exe 84 PID 2896 wrote to memory of 2516 2896 cmd.exe 84 PID 2084 wrote to memory of 3744 2084 HexDecryptor.exe 85 PID 2084 wrote to memory of 3744 2084 HexDecryptor.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\myfile.exe"C:\Users\Admin\AppData\Local\Temp\myfile.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7545.tmp\7556.tmp\7557.bat C:\Users\Admin\AppData\Local\Temp\myfile.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\tree.comtree3⤵PID:1468
-
-
C:\Windows\system32\tree.comtree3⤵PID:3856
-
-
C:\Windows\system32\tree.comtree3⤵PID:1732
-
-
C:\Windows\system32\tree.comtree3⤵PID:3204
-
-
C:\Windows\system32\tree.comtree3⤵PID:3436
-
-
C:\Users\Admin\Desktop\HexInformation.exeHexInformation.exe3⤵
- Executes dropped EXE
PID:3100
-
-
C:\Users\Admin\Desktop\HexDecryptor.exeHexDecryptor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7FB5.tmp\7FB6.tmp\7FB7.bat C:\Users\Admin\Desktop\HexDecryptor.exe"4⤵PID:3744
-
-
-
C:\Users\Admin\Desktop\HexLocker.exeHexLocker.exe3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
PID:2516
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:892