Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15-05-2021 04:44
Static task
static1
Behavioral task
behavioral1
Sample
ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe
Resource
win10v20210410
General
-
Target
ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe
-
Size
1.9MB
-
MD5
ba3851b7a3b93b34ab082dd184b01969
-
SHA1
04a9cf0d8a973c9de96dae6fd830f9780512424d
-
SHA256
ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1
-
SHA512
4765f079e434990360f34c3bf8c90d9e48ba0ff988a3a2d2edacf30085eb6a8ce10af3677d199a5830bd80278965674afac15e79438872946d2213268324e121
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
test.exetest.exetest.exepid process 328 test.exe 932 test.exe 1540 test.exe -
Processes:
resource yara_rule behavioral1/memory/1168-71-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1168-75-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1540-113-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1540-121-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Loads dropped DLL 5 IoCs
Processes:
ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exepid process 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\test\\test.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exetest.exedescription pid process target process PID 1688 set thread context of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 328 set thread context of 932 328 test.exe test.exe PID 328 set thread context of 1540 328 test.exe test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
test.exetest.exedescription pid process Token: SeIncreaseQuotaPrivilege 1540 test.exe Token: SeSecurityPrivilege 1540 test.exe Token: SeTakeOwnershipPrivilege 1540 test.exe Token: SeLoadDriverPrivilege 1540 test.exe Token: SeSystemProfilePrivilege 1540 test.exe Token: SeSystemtimePrivilege 1540 test.exe Token: SeProfSingleProcessPrivilege 1540 test.exe Token: SeIncBasePriorityPrivilege 1540 test.exe Token: SeCreatePagefilePrivilege 1540 test.exe Token: SeBackupPrivilege 1540 test.exe Token: SeRestorePrivilege 1540 test.exe Token: SeShutdownPrivilege 1540 test.exe Token: SeDebugPrivilege 1540 test.exe Token: SeSystemEnvironmentPrivilege 1540 test.exe Token: SeChangeNotifyPrivilege 1540 test.exe Token: SeRemoteShutdownPrivilege 1540 test.exe Token: SeUndockPrivilege 1540 test.exe Token: SeManageVolumePrivilege 1540 test.exe Token: SeImpersonatePrivilege 1540 test.exe Token: SeCreateGlobalPrivilege 1540 test.exe Token: 33 1540 test.exe Token: 34 1540 test.exe Token: 35 1540 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe Token: SeDebugPrivilege 932 test.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exeac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exetest.exetest.exepid process 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe 328 test.exe 932 test.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exeac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.execmd.exetest.exedescription pid process target process PID 1688 wrote to memory of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 1688 wrote to memory of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 1688 wrote to memory of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 1688 wrote to memory of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 1688 wrote to memory of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 1688 wrote to memory of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 1688 wrote to memory of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 1688 wrote to memory of 1168 1688 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe PID 1168 wrote to memory of 1552 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe cmd.exe PID 1168 wrote to memory of 1552 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe cmd.exe PID 1168 wrote to memory of 1552 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe cmd.exe PID 1168 wrote to memory of 1552 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe cmd.exe PID 1552 wrote to memory of 1236 1552 cmd.exe reg.exe PID 1552 wrote to memory of 1236 1552 cmd.exe reg.exe PID 1552 wrote to memory of 1236 1552 cmd.exe reg.exe PID 1552 wrote to memory of 1236 1552 cmd.exe reg.exe PID 1168 wrote to memory of 328 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe test.exe PID 1168 wrote to memory of 328 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe test.exe PID 1168 wrote to memory of 328 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe test.exe PID 1168 wrote to memory of 328 1168 ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe test.exe PID 328 wrote to memory of 932 328 test.exe test.exe PID 328 wrote to memory of 932 328 test.exe test.exe PID 328 wrote to memory of 932 328 test.exe test.exe PID 328 wrote to memory of 932 328 test.exe test.exe PID 328 wrote to memory of 932 328 test.exe test.exe PID 328 wrote to memory of 932 328 test.exe test.exe PID 328 wrote to memory of 932 328 test.exe test.exe PID 328 wrote to memory of 932 328 test.exe test.exe PID 328 wrote to memory of 1540 328 test.exe test.exe PID 328 wrote to memory of 1540 328 test.exe test.exe PID 328 wrote to memory of 1540 328 test.exe test.exe PID 328 wrote to memory of 1540 328 test.exe test.exe PID 328 wrote to memory of 1540 328 test.exe test.exe PID 328 wrote to memory of 1540 328 test.exe test.exe PID 328 wrote to memory of 1540 328 test.exe test.exe PID 328 wrote to memory of 1540 328 test.exe test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe"C:\Users\Admin\AppData\Local\Temp\ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe"C:\Users\Admin\AppData\Local\Temp\ac7730946cebdf5ebf972d73356681662f2058d9a71517ff74e2a986276272f1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HMEVM.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f4⤵
- Adds Run key to start application
PID:1236 -
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
527683c48cc4c7190219814c77b72fe0
SHA1d995878a8f4b9824a0508039eeada5376be9a52d
SHA256bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b
SHA512408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6
-
MD5
94d9b42c1466920403dcae7693fee217
SHA1e395526bee14ecc603fa46d8f53c338793c4eeb4
SHA25670c8f5e1e32900b1c913d80905977f6134f29a77ba4cb231175401ab33e5b92b
SHA512248cbc9be0a4fe07f0ef3bdb40ea36d35543dbc0682ef7cab664df48655952545d091c4514175a9fd8fed5d9e161592de8c1da6ec974712d223c71e422b2e5a6