Analysis
-
max time kernel
13s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-06-2021 12:06
Static task
static1
Behavioral task
behavioral1
Sample
mvs.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
mvs.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
mvs.exe
-
Size
476KB
-
MD5
faf25564825a05a4c01870cdc0535525
-
SHA1
54d7f92637e31e4c1aed0a58b690d7d99886c380
-
SHA256
82732e47492148243ee3fb338c93d43b9a9984f39e3409327600cffc5766af1b
-
SHA512
b44be2421a074ea986336b0c179a6d416c845ae44b4ca67d31594506bd79a3fdfa2907d7bcf7b3c46f1d942e0b057fbd8bce3a02bceb5bf91e1e70c30a57f0db
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2124 a.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier reg.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 reg.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 584 systeminfo.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3936 reg.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 804 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3744 wrote to memory of 2124 3744 mvs.exe 75 PID 3744 wrote to memory of 2124 3744 mvs.exe 75 PID 3744 wrote to memory of 2124 3744 mvs.exe 75 PID 2124 wrote to memory of 3740 2124 a.exe 79 PID 2124 wrote to memory of 3740 2124 a.exe 79 PID 2124 wrote to memory of 3740 2124 a.exe 79 PID 3740 wrote to memory of 584 3740 cmd.exe 80 PID 3740 wrote to memory of 584 3740 cmd.exe 80 PID 3740 wrote to memory of 584 3740 cmd.exe 80 PID 3740 wrote to memory of 3608 3740 cmd.exe 84 PID 3740 wrote to memory of 3608 3740 cmd.exe 84 PID 3740 wrote to memory of 3608 3740 cmd.exe 84 PID 3740 wrote to memory of 1332 3740 cmd.exe 85 PID 3740 wrote to memory of 1332 3740 cmd.exe 85 PID 3740 wrote to memory of 1332 3740 cmd.exe 85 PID 3740 wrote to memory of 804 3740 cmd.exe 86 PID 3740 wrote to memory of 804 3740 cmd.exe 86 PID 3740 wrote to memory of 804 3740 cmd.exe 86 PID 3740 wrote to memory of 2236 3740 cmd.exe 87 PID 3740 wrote to memory of 2236 3740 cmd.exe 87 PID 3740 wrote to memory of 2236 3740 cmd.exe 87 PID 3740 wrote to memory of 2180 3740 cmd.exe 88 PID 3740 wrote to memory of 2180 3740 cmd.exe 88 PID 3740 wrote to memory of 2180 3740 cmd.exe 88 PID 3740 wrote to memory of 1468 3740 cmd.exe 89 PID 3740 wrote to memory of 1468 3740 cmd.exe 89 PID 3740 wrote to memory of 1468 3740 cmd.exe 89 PID 3740 wrote to memory of 3860 3740 cmd.exe 90 PID 3740 wrote to memory of 3860 3740 cmd.exe 90 PID 3740 wrote to memory of 3860 3740 cmd.exe 90 PID 3740 wrote to memory of 2380 3740 cmd.exe 91 PID 3740 wrote to memory of 2380 3740 cmd.exe 91 PID 3740 wrote to memory of 2380 3740 cmd.exe 91 PID 3740 wrote to memory of 1912 3740 cmd.exe 92 PID 3740 wrote to memory of 1912 3740 cmd.exe 92 PID 3740 wrote to memory of 1912 3740 cmd.exe 92 PID 3740 wrote to memory of 2120 3740 cmd.exe 93 PID 3740 wrote to memory of 2120 3740 cmd.exe 93 PID 3740 wrote to memory of 2120 3740 cmd.exe 93 PID 3740 wrote to memory of 3936 3740 cmd.exe 94 PID 3740 wrote to memory of 3936 3740 cmd.exe 94 PID 3740 wrote to memory of 3936 3740 cmd.exe 94 PID 3740 wrote to memory of 4024 3740 cmd.exe 95 PID 3740 wrote to memory of 4024 3740 cmd.exe 95 PID 3740 wrote to memory of 4024 3740 cmd.exe 95 PID 3740 wrote to memory of 3500 3740 cmd.exe 96 PID 3740 wrote to memory of 3500 3740 cmd.exe 96 PID 3740 wrote to memory of 3500 3740 cmd.exe 96 PID 3740 wrote to memory of 204 3740 cmd.exe 97 PID 3740 wrote to memory of 204 3740 cmd.exe 97 PID 3740 wrote to memory of 204 3740 cmd.exe 97 PID 3740 wrote to memory of 3928 3740 cmd.exe 98 PID 3740 wrote to memory of 3928 3740 cmd.exe 98 PID 3740 wrote to memory of 3928 3740 cmd.exe 98 PID 3740 wrote to memory of 3968 3740 cmd.exe 99 PID 3740 wrote to memory of 3968 3740 cmd.exe 99 PID 3740 wrote to memory of 3968 3740 cmd.exe 99 PID 3740 wrote to memory of 2184 3740 cmd.exe 100 PID 3740 wrote to memory of 2184 3740 cmd.exe 100 PID 3740 wrote to memory of 2184 3740 cmd.exe 100 PID 2184 wrote to memory of 3996 2184 cmd.exe 101 PID 2184 wrote to memory of 3996 2184 cmd.exe 101 PID 2184 wrote to memory of 3996 2184 cmd.exe 101 PID 3740 wrote to memory of 3108 3740 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\mvs.exe"C:\Users\Admin\AppData\Local\Temp\mvs.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\windows\temp\a.exe"C:\windows\temp\a.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2773.tmp\a.bat" "C:\windows\temp\a.exe""3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo /fo list4⤵
- Gathers system information
PID:584
-
-
C:\Windows\SysWOW64\find.exeFind /i "OS Name: "4⤵PID:3608
-
-
C:\Windows\SysWOW64\find.exeFind /i "OS Version: "4⤵PID:1332
-
-
C:\Windows\SysWOW64\find.exeFind /i "System Model:"4⤵PID:804
-
-
C:\Windows\SysWOW64\find.exeFind /i "System Manufacturer: "4⤵PID:2236
-
-
C:\Windows\SysWOW64\find.exeFind /i "BIOS Version:"4⤵PID:2180
-
-
C:\Windows\SysWOW64\find.exeFind /i "Total Physical Memory: "4⤵PID:1468
-
-
C:\Windows\SysWOW64\find.exeFind /i "Time Zone:"4⤵PID:3860
-
-
C:\Windows\SysWOW64\find.exeFind /i "DHCP Server:"4⤵PID:2380
-
-
C:\Windows\SysWOW64\find.exeFind /i "Connection Name:"4⤵PID:1912
-
-
C:\Windows\SysWOW64\find.exeFind /i "Original Install Date: "4⤵PID:2120
-
-
C:\Windows\SysWOW64\reg.exereg query HKLM\Hardware\Description\System\CentralProcessor\0 /v Identifier4⤵
- Checks processor information in registry
- Modifies registry key
PID:3936
-
-
C:\Windows\SysWOW64\find.exeFind /i "x86"4⤵PID:4024
-
-
C:\Windows\SysWOW64\getmac.exegetmac /nh4⤵PID:3500
-
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_CLASSES_ROOT\http\shell\open\command" /ve4⤵PID:204
-
-
C:\Windows\SysWOW64\findstr.exeFindstr /i "Program Files" c:\windows\temp\c.txt4⤵PID:3928
-
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion4⤵PID:3968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion4⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\reg.exeReg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer" /v SVCversion5⤵PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox" /v CurrentVersion4⤵PID:3108
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_LOCAL_MACHINE\SOFTWARE\Mozilla\Mozilla Firefox" /v CurrentVersion5⤵PID:1436
-
-
-
C:\Windows\SysWOW64\reg.exeReg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Adobe Flash Player Plugin" /v DisplayVersion4⤵PID:1364
-
-
C:\Windows\SysWOW64\findstr.exeFindstr /i "REG_SZ" c:\windows\temp\123.txt4⤵PID:2840
-
-
C:\Windows\SysWOW64\reg.exereg query "HKLM\SOFTWARE\Adobe\Acrobat Reader"4⤵PID:2628
-
-
C:\Windows\SysWOW64\reg.exeReg query "HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Plug-in"4⤵PID:3180
-
-
C:\Windows\SysWOW64\findstr.exeFindstr /i "1" c:\windows\temp\123.txt4⤵PID:2072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver "4⤵PID:428
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "5\.1\."4⤵PID:3744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query mpssvc | findstr /i "STATE"4⤵PID:3588
-
C:\Windows\SysWOW64\sc.exesc query mpssvc5⤵PID:3060
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "STATE"5⤵PID:1832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query mpssvc | findstr /i "installed"4⤵PID:192
-
C:\Windows\SysWOW64\sc.exesc query mpssvc5⤵PID:944
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "installed"5⤵PID:3500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query wuauserv | findstr /i "STATE"4⤵PID:1208
-
C:\Windows\SysWOW64\sc.exesc query wuauserv5⤵PID:1204
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "STATE"5⤵PID:348
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query wuauserv | findstr /i "installed"4⤵PID:1016
-
C:\Windows\SysWOW64\sc.exesc query wuauserv5⤵PID:2112
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "installed"5⤵PID:356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query wscsvc | findstr /i "STATE"4⤵PID:2844
-
C:\Windows\SysWOW64\sc.exesc query wscsvc5⤵PID:2836
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "STATE"5⤵PID:3980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query wscsvc | findstr /i "installed"4⤵PID:2480
-
C:\Windows\SysWOW64\sc.exesc query wscsvc5⤵PID:2660
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "installed"5⤵PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query msiserver | findstr /i "STATE"4⤵PID:3772
-
C:\Windows\SysWOW64\sc.exesc query msiserver5⤵PID:428
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "STATE"5⤵PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc query msiserver | findstr /i "installed"4⤵PID:188
-
C:\Windows\SysWOW64\sc.exesc query msiserver5⤵PID:1832
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i "installed"5⤵PID:3404
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\windows\temp\Report.txt4⤵
- Opens file in notepad (likely ransom note)
PID:804
-
-
-