Analysis
-
max time kernel
151s -
max time network
94s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 12:58
Static task
static1
Behavioral task
behavioral1
Sample
58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe
Resource
win10v20210408
General
-
Target
58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe
-
Size
216KB
-
MD5
1dfc1cf679e362a6ba6d0f3f7a92ba7e
-
SHA1
2af4065eba0bd676c101e6d0ef2271e2a6865a68
-
SHA256
58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a
-
SHA512
8786dd703b31ed761a2ba0431fb7a42f81c762ebe58918050c73596d3715f1c72d4cc6700edee8406bd1ba563a8c67eb5a1d1d50f8d1f2045a37a2ff62aff605
Malware Config
Extracted
C:\ProgramData\cryptinfo.txt
1HN1r24sZ79yTS6pAczzyCssCtL8UsaqL6
Signatures
-
DMA Locker
Ransomware family with some advanced features, like encryption of unmapped network shares.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\ProgramData\\svchosd.exe" 58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "notepad C:\\ProgramData\\cryptinfo.txt" 58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\ProgramData\\svchosd.exe" svchosd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "notepad C:\\ProgramData\\cryptinfo.txt" svchosd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1672 58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe 1820 svchosd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\bg.txt svchosd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\tipresx.dll.mui svchosd.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-static.png svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html svchosd.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuching svchosd.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Pontianak svchosd.exe File created C:\Program Files\Internet Explorer\en-US\jsprofilerui.dll.mui svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+11 svchosd.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\highDpiImageSwap.js svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cambridge_Bay svchosd.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\greenStateIcon.png svchosd.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\dblook svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\DumontDUrville svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-execution_zh_CN.jar svchosd.exe File created C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.syntheticattribute.exsd svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host-remote.xml svchosd.exe File created C:\Program Files\Windows Media Player\en-US\mpvis.dll.mui svchosd.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-2.png svchosd.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\THMBNAIL.PNG svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.nl_zh_4.4.0.v20140623020002.jar svchosd.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\slideShow.css svchosd.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\Keywords.HxK svchosd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgePackages.h svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\St_Johns svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Karachi svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Paris svchosd.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\twitch.luac svchosd.exe File created C:\Program Files\Windows NT\TableTextService\en-US\TableTextService.dll.mui svchosd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_fr.properties svchosd.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_snow.png svchosd.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_initiator.gif svchosd.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_ButtonGraphic.png svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\psfontj2d.properties svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Inuvik svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx.ja_5.5.0.165303.jar svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring-impl_ja.jar svchosd.exe File opened for modification C:\Program Files\Java\jre7\lib\security\javafx.policy svchosd.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\dailymotion.luac svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser_5.5.0.165303.jar svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-masterfs.jar svchosd.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa37.hyp svchosd.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\16-on-black.gif svchosd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsita.xml svchosd.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome.dll.sig svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Accra svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Hebron svchosd.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Eucla svchosd.exe File created C:\Program Files\Windows Journal\en-US\Journal.exe.mui svchosd.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\gadget.xml svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ho_Chi_Minh svchosd.exe File created C:\Program Files\Common Files\System\ado\msado21.tlb svchosd.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationUp_ButtonGraphic.png svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.directorywatcher_1.1.0.v20131211-1531.jar svchosd.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\2.png svchosd.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\MSB1ARFR.ITS svchosd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\eclipse.inf svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\file_obj.gif svchosd.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench3.nl_ja_4.4.0.v20140623020002.jar svchosd.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\IA32.api svchosd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1672 58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1820 1672 58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe 27 PID 1672 wrote to memory of 1820 1672 58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe 27 PID 1672 wrote to memory of 1820 1672 58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe 27 PID 1672 wrote to memory of 1820 1672 58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe"C:\Users\Admin\AppData\Local\Temp\58e5387a57aa7a6feeeee884d9e908c73de48412b0036f1f4ea1b9570ce69c2a.sample.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\ProgramData\svchosd.exe"C:\ProgramData\svchosd.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
PID:1820
-