Analysis
-
max time kernel
29s -
max time network
28s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
17-04-2021 20:07
Static task
static1
Behavioral task
behavioral1
Sample
build_v2.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
build_v2.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
build_v2.exe
-
Size
781KB
-
MD5
ca488b40ff017aa2e5edfb657195b19a
-
SHA1
8591740a747320a93eef73850a29a109cac17a26
-
SHA256
5e11767db92bef1591938a448d1d391202e6c8d8ddf0275dc8d72fd375b950db
-
SHA512
73e99e1da85da472e97b0184a71fbffc39b81dd9daffecd640443413976b147941b79f51b2cc7aa90da68b8ba5a39e5541437c41509ca9280082b5a400c441ca
Score
8/10
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Drops startup file 1 IoCs
Processes:
build_v2.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HANTA.exe build_v2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
build_v2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\hanta_ransom = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\HANTA.exe\"" build_v2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
build_v2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wall.jpg" build_v2.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3456 1652 WerFault.exe build_v2.exe -
Modifies Control Panel 2 IoCs
Processes:
build_v2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop\WallpaperStyle = "1" build_v2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\Desktop\TileWallpaper = "0" build_v2.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
build_v2.exeWerFault.exepid process 1652 build_v2.exe 1652 build_v2.exe 1652 build_v2.exe 1652 build_v2.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe 3456 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
build_v2.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1652 build_v2.exe Token: SeDebugPrivilege 3456 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
build_v2.exedescription pid process target process PID 1652 wrote to memory of 3456 1652 build_v2.exe WerFault.exe PID 1652 wrote to memory of 3456 1652 build_v2.exe WerFault.exe PID 1652 wrote to memory of 3456 1652 build_v2.exe WerFault.exe PID 1652 wrote to memory of 3456 1652 build_v2.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build_v2.exe"C:\Users\Admin\AppData\Local\Temp\build_v2.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 87682⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1652-60-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/1652-62-0x00000000004C0000-0x00000000004C1000-memory.dmpFilesize
4KB
-
memory/1652-63-0x00000000049B0000-0x0000000004A65000-memory.dmpFilesize
724KB
-
memory/1652-65-0x0000000000450000-0x0000000000451000-memory.dmpFilesize
4KB
-
memory/1652-64-0x0000000001E90000-0x0000000001E91000-memory.dmpFilesize
4KB
-
memory/3456-66-0x0000000000000000-mapping.dmp
-
memory/3456-67-0x00000000001F0000-0x0000000000250000-memory.dmpFilesize
384KB