Analysis
-
max time kernel
11s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-06-2021 12:06
Static task
static1
Behavioral task
behavioral1
Sample
mvs.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
mvs.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
mvs.exe
-
Size
476KB
-
MD5
faf25564825a05a4c01870cdc0535525
-
SHA1
54d7f92637e31e4c1aed0a58b690d7d99886c380
-
SHA256
82732e47492148243ee3fb338c93d43b9a9984f39e3409327600cffc5766af1b
-
SHA512
b44be2421a074ea986336b0c179a6d416c845ae44b4ca67d31594506bd79a3fdfa2907d7bcf7b3c46f1d942e0b057fbd8bce3a02bceb5bf91e1e70c30a57f0db
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1052 a.exe -
Loads dropped DLL 3 IoCs
pid Process 1796 mvs.exe 1796 mvs.exe 1796 mvs.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier reg.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1840 systeminfo.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1004 reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1768 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1052 1796 mvs.exe 26 PID 1796 wrote to memory of 1052 1796 mvs.exe 26 PID 1796 wrote to memory of 1052 1796 mvs.exe 26 PID 1796 wrote to memory of 1052 1796 mvs.exe 26 PID 1796 wrote to memory of 1052 1796 mvs.exe 26 PID 1796 wrote to memory of 1052 1796 mvs.exe 26 PID 1796 wrote to memory of 1052 1796 mvs.exe 26 PID 1052 wrote to memory of 2000 1052 a.exe 28 PID 1052 wrote to memory of 2000 1052 a.exe 28 PID 1052 wrote to memory of 2000 1052 a.exe 28 PID 1052 wrote to memory of 2000 1052 a.exe 28 PID 1052 wrote to memory of 2000 1052 a.exe 28 PID 1052 wrote to memory of 2000 1052 a.exe 28 PID 1052 wrote to memory of 2000 1052 a.exe 28 PID 2000 wrote to memory of 1840 2000 cmd.exe 29 PID 2000 wrote to memory of 1840 2000 cmd.exe 29 PID 2000 wrote to memory of 1840 2000 cmd.exe 29 PID 2000 wrote to memory of 1840 2000 cmd.exe 29 PID 2000 wrote to memory of 1840 2000 cmd.exe 29 PID 2000 wrote to memory of 1840 2000 cmd.exe 29 PID 2000 wrote to memory of 1840 2000 cmd.exe 29 PID 2000 wrote to memory of 292 2000 cmd.exe 35 PID 2000 wrote to memory of 292 2000 cmd.exe 35 PID 2000 wrote to memory of 292 2000 cmd.exe 35 PID 2000 wrote to memory of 292 2000 cmd.exe 35 PID 2000 wrote to memory of 292 2000 cmd.exe 35 PID 2000 wrote to memory of 292 2000 cmd.exe 35 PID 2000 wrote to memory of 292 2000 cmd.exe 35 PID 2000 wrote to memory of 1096 2000 cmd.exe 36 PID 2000 wrote to memory of 1096 2000 cmd.exe 36 PID 2000 wrote to memory of 1096 2000 cmd.exe 36 PID 2000 wrote to memory of 1096 2000 cmd.exe 36 PID 2000 wrote to memory of 1096 2000 cmd.exe 36 PID 2000 wrote to memory of 1096 2000 cmd.exe 36 PID 2000 wrote to memory of 1096 2000 cmd.exe 36 PID 2000 wrote to memory of 896 2000 cmd.exe 37 PID 2000 wrote to memory of 896 2000 cmd.exe 37 PID 2000 wrote to memory of 896 2000 cmd.exe 37 PID 2000 wrote to memory of 896 2000 cmd.exe 37 PID 2000 wrote to memory of 896 2000 cmd.exe 37 PID 2000 wrote to memory of 896 2000 cmd.exe 37 PID 2000 wrote to memory of 896 2000 cmd.exe 37 PID 2000 wrote to memory of 872 2000 cmd.exe 38 PID 2000 wrote to memory of 872 2000 cmd.exe 38 PID 2000 wrote to memory of 872 2000 cmd.exe 38 PID 2000 wrote to memory of 872 2000 cmd.exe 38 PID 2000 wrote to memory of 872 2000 cmd.exe 38 PID 2000 wrote to memory of 872 2000 cmd.exe 38 PID 2000 wrote to memory of 872 2000 cmd.exe 38 PID 2000 wrote to memory of 1748 2000 cmd.exe 39 PID 2000 wrote to memory of 1748 2000 cmd.exe 39 PID 2000 wrote to memory of 1748 2000 cmd.exe 39 PID 2000 wrote to memory of 1748 2000 cmd.exe 39 PID 2000 wrote to memory of 1748 2000 cmd.exe 39 PID 2000 wrote to memory of 1748 2000 cmd.exe 39 PID 2000 wrote to memory of 1748 2000 cmd.exe 39 PID 2000 wrote to memory of 1580 2000 cmd.exe 40 PID 2000 wrote to memory of 1580 2000 cmd.exe 40 PID 2000 wrote to memory of 1580 2000 cmd.exe 40 PID 2000 wrote to memory of 1580 2000 cmd.exe 40 PID 2000 wrote to memory of 1580 2000 cmd.exe 40 PID 2000 wrote to memory of 1580 2000 cmd.exe 40 PID 2000 wrote to memory of 1580 2000 cmd.exe 40 PID 2000 wrote to memory of 1664 2000 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\mvs.exe"C:\Users\Admin\AppData\Local\Temp\mvs.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\windows\temp\a.exe"C:\windows\temp\a.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\539C.tmp\a.bat" "C:\windows\temp\a.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo /fo list4⤵
- Gathers system information
PID:1840
-
-
C:\Windows\SysWOW64\find.exeFind /i "OS Name: "4⤵PID:292
-
-
C:\Windows\SysWOW64\find.exeFind /i "OS Version: "4⤵PID:1096
-
-
C:\Windows\SysWOW64\find.exeFind /i "System Model:"4⤵PID:896
-
-
C:\Windows\SysWOW64\find.exeFind /i "System Manufacturer: "4⤵PID:872
-
-
C:\Windows\SysWOW64\find.exeFind /i "BIOS Version:"4⤵PID:1748
-
-
C:\Windows\SysWOW64\find.exeFind /i "Total Physical Memory: "4⤵PID:1580
-
-
C:\Windows\SysWOW64\find.exeFind /i "Time Zone:"4⤵PID:1664
-
-
C:\Windows\SysWOW64\find.exeFind /i "DHCP Server:"4⤵PID:1340
-
-
C:\Windows\SysWOW64\find.exeFind /i "Connection Name:"4⤵PID:920
-
-
C:\Windows\SysWOW64\find.exeFind /i "Original Install Date: "4⤵PID:304
-
-
C:\Windows\SysWOW64\reg.exereg query HKLM\Hardware\Description\System\CentralProcessor\0 /v Identifier4⤵
- Checks processor information in registry
- Modifies registry key
PID:1004
-
-
C:\Windows\SysWOW64\find.exeFind /i "x86"4⤵PID:1608
-
-
C:\Windows\SysWOW64\getmac.exegetmac /nh4⤵PID:1600
-
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_CLASSES_ROOT\http\shell\open\command" /ve4⤵PID:1984
-
-
C:\Windows\SysWOW64\findstr.exeFindstr /i "Program Files" c:\windows\temp\c.txt4⤵PID:1844
-
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion4⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion4⤵PID:1704
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion5⤵PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox" /v CurrentVersion4⤵PID:1256
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox" /v CurrentVersion5⤵PID:1360
-
-
-
C:\Windows\SysWOW64\reg.exeReg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player Plugin" /v DisplayVersion4⤵PID:1232
-
-
C:\Windows\SysWOW64\findstr.exeFindstr /i "REG_SZ" c:\windows\temp\123.txt4⤵PID:964
-
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SOFTWARE\Adobe\Acrobat Reader"4⤵PID:1388
-
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Plug-in"4⤵PID:1792
-
-
C:\Windows\SysWOW64\findstr.exeFindstr /i "1" c:\windows\temp\123.txt4⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver "4⤵PID:1756
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "5\.1\."4⤵PID:1036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query mpssvc | findstr /i "STATE"4⤵PID:1612
-
C:\Windows\SysWOW64\sc.exesc query mpssvc5⤵PID:1648
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "STATE"5⤵PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query mpssvc | findstr /i "installed"4⤵PID:1252
-
C:\Windows\SysWOW64\sc.exesc query mpssvc5⤵PID:1948
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "installed"5⤵PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query wuauserv | findstr /i "STATE"4⤵PID:1736
-
C:\Windows\SysWOW64\sc.exesc query wuauserv5⤵PID:1840
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "STATE"5⤵PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query wuauserv | findstr /i "installed"4⤵PID:864
-
C:\Windows\SysWOW64\sc.exesc query wuauserv5⤵PID:1360
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "installed"5⤵PID:872
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query wscsvc | findstr /i "STATE"4⤵PID:1640
-
C:\Windows\SysWOW64\sc.exesc query wscsvc5⤵PID:1744
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "STATE"5⤵PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query wscsvc | findstr /i "installed"4⤵PID:1500
-
C:\Windows\SysWOW64\sc.exesc query wscsvc5⤵PID:1956
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "installed"5⤵PID:856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query msiserver | findstr /i "STATE"4⤵PID:1164
-
C:\Windows\SysWOW64\sc.exesc query msiserver5⤵PID:1644
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "STATE"5⤵PID:1612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query msiserver | findstr /i "installed"4⤵PID:1156
-
C:\Windows\SysWOW64\sc.exesc query msiserver5⤵PID:1948
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "installed"5⤵PID:2028
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\windows\temp\Report.txt4⤵
- Opens file in notepad (likely ransom note)
PID:1768
-
-
-