Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
08-05-2021 22:32
Static task
static1
Behavioral task
behavioral1
Sample
183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe
Resource
win10v20210410
General
-
Target
183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe
-
Size
1.9MB
-
MD5
b4dcd2d1d30d94db8313fff13fcec458
-
SHA1
bb77b06b84e44bbf191caaf93bf63928bcff9669
-
SHA256
183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f
-
SHA512
26cfe666dadc7473d46b2eac42de712a20559e56d5f071af3ffdacde183895983ce1b6f4cf922d50112f6e92aeb31c9ea8df101c1eeaeb6b0b67d8f775229a9f
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
test.exetest.exetest.exepid process 1712 test.exe 612 test.exe 1516 test.exe -
Processes:
resource yara_rule behavioral1/memory/1968-75-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1968-70-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1516-107-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Loads dropped DLL 5 IoCs
Processes:
183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exepid process 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\test\\test.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exetest.exedescription pid process target process PID 788 set thread context of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 1712 set thread context of 612 1712 test.exe test.exe PID 1712 set thread context of 1516 1712 test.exe test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
test.exetest.exedescription pid process Token: SeIncreaseQuotaPrivilege 1516 test.exe Token: SeSecurityPrivilege 1516 test.exe Token: SeTakeOwnershipPrivilege 1516 test.exe Token: SeLoadDriverPrivilege 1516 test.exe Token: SeSystemProfilePrivilege 1516 test.exe Token: SeSystemtimePrivilege 1516 test.exe Token: SeProfSingleProcessPrivilege 1516 test.exe Token: SeIncBasePriorityPrivilege 1516 test.exe Token: SeCreatePagefilePrivilege 1516 test.exe Token: SeBackupPrivilege 1516 test.exe Token: SeRestorePrivilege 1516 test.exe Token: SeShutdownPrivilege 1516 test.exe Token: SeDebugPrivilege 1516 test.exe Token: SeSystemEnvironmentPrivilege 1516 test.exe Token: SeChangeNotifyPrivilege 1516 test.exe Token: SeRemoteShutdownPrivilege 1516 test.exe Token: SeUndockPrivilege 1516 test.exe Token: SeManageVolumePrivilege 1516 test.exe Token: SeImpersonatePrivilege 1516 test.exe Token: SeCreateGlobalPrivilege 1516 test.exe Token: 33 1516 test.exe Token: 34 1516 test.exe Token: 35 1516 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe Token: SeDebugPrivilege 612 test.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exetest.exetest.exepid process 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 1712 test.exe 612 test.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.execmd.exetest.exedescription pid process target process PID 788 wrote to memory of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 788 wrote to memory of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 788 wrote to memory of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 788 wrote to memory of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 788 wrote to memory of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 788 wrote to memory of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 788 wrote to memory of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 788 wrote to memory of 1968 788 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe PID 1968 wrote to memory of 604 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe cmd.exe PID 1968 wrote to memory of 604 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe cmd.exe PID 1968 wrote to memory of 604 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe cmd.exe PID 1968 wrote to memory of 604 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe cmd.exe PID 604 wrote to memory of 860 604 cmd.exe reg.exe PID 604 wrote to memory of 860 604 cmd.exe reg.exe PID 604 wrote to memory of 860 604 cmd.exe reg.exe PID 604 wrote to memory of 860 604 cmd.exe reg.exe PID 1968 wrote to memory of 1712 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe test.exe PID 1968 wrote to memory of 1712 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe test.exe PID 1968 wrote to memory of 1712 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe test.exe PID 1968 wrote to memory of 1712 1968 183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe test.exe PID 1712 wrote to memory of 612 1712 test.exe test.exe PID 1712 wrote to memory of 612 1712 test.exe test.exe PID 1712 wrote to memory of 612 1712 test.exe test.exe PID 1712 wrote to memory of 612 1712 test.exe test.exe PID 1712 wrote to memory of 612 1712 test.exe test.exe PID 1712 wrote to memory of 612 1712 test.exe test.exe PID 1712 wrote to memory of 612 1712 test.exe test.exe PID 1712 wrote to memory of 612 1712 test.exe test.exe PID 1712 wrote to memory of 1516 1712 test.exe test.exe PID 1712 wrote to memory of 1516 1712 test.exe test.exe PID 1712 wrote to memory of 1516 1712 test.exe test.exe PID 1712 wrote to memory of 1516 1712 test.exe test.exe PID 1712 wrote to memory of 1516 1712 test.exe test.exe PID 1712 wrote to memory of 1516 1712 test.exe test.exe PID 1712 wrote to memory of 1516 1712 test.exe test.exe PID 1712 wrote to memory of 1516 1712 test.exe test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe"C:\Users\Admin\AppData\Local\Temp\183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe"C:\Users\Admin\AppData\Local\Temp\183d7b9520584c2779641472fc9d98feb1a7b68f7a7a510cdc271a795311700f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BYGUT.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f4⤵
- Adds Run key to start application
PID:860
-
-
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:612
-
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
527683c48cc4c7190219814c77b72fe0
SHA1d995878a8f4b9824a0508039eeada5376be9a52d
SHA256bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b
SHA512408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce
-
MD5
1ccdc21516227cef30ff96038c187eb1
SHA182fe6678de707a17db12055108a6c39a7e459de3
SHA25696e506f84b7f8e0a4a75f79f76ec84a815ddd6ccbb329b0769a7fc29de1aeccf
SHA5124144bef1daf8eff48b1cdd4191acf01e235665e1db2ca1ba8d67f06a40f5a1574d19f52a16abae57c8a7d90649830f3776abcb157dbcb13981d9dc14b5a7f7ce