Analysis
-
max time kernel
170s -
max time network
180s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 04:24
Static task
static1
Behavioral task
behavioral1
Sample
9b1bd4ac06317156fdd4d2cb6b416ed81ad2785ca3d14370f39b16dcde4aba36.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
9b1bd4ac06317156fdd4d2cb6b416ed81ad2785ca3d14370f39b16dcde4aba36.exe
-
Size
9.3MB
-
MD5
9d5501a42d0e63e0689909ff81326f38
-
SHA1
9d0ea6c305ea69146be1d5174235a665eb787a79
-
SHA256
9b1bd4ac06317156fdd4d2cb6b416ed81ad2785ca3d14370f39b16dcde4aba36
-
SHA512
b8c4e113285df71331ee89b11051fd686444bd2ee319664b07edfa928a7de0ed4750ef5e8ec7fdfaeb47723882d95b11ce9183da959a554783f9a6af50e22670
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 912 snpt.exe 3760 snpt.exe 1952 snpt.exe 2232 snpt.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\exe\snpt.pdb snpt.exe File opened for modification C:\Windows\SysWOW64\symbols\exe\snpt.pdb snpt.exe File opened for modification C:\Windows\SysWOW64\snpt.pdb snpt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 3556 timeout.exe -
Kills process with taskkill 9 IoCs
pid Process 1152 taskkill.exe 3020 taskkill.exe 1640 taskkill.exe 1264 taskkill.exe 1684 taskkill.exe 1516 taskkill.exe 404 taskkill.exe 3512 taskkill.exe 3940 taskkill.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1676 regedit.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 912 snpt.exe 912 snpt.exe 912 snpt.exe 912 snpt.exe 912 snpt.exe 912 snpt.exe 3760 snpt.exe 3760 snpt.exe 1952 snpt.exe 1952 snpt.exe 2232 snpt.exe 2232 snpt.exe 2232 snpt.exe 2232 snpt.exe 2232 snpt.exe 2232 snpt.exe 2232 snpt.exe 2232 snpt.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 3512 taskkill.exe Token: SeDebugPrivilege 3020 taskkill.exe Token: SeDebugPrivilege 3940 taskkill.exe Token: SeDebugPrivilege 1264 taskkill.exe Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 1516 taskkill.exe Token: SeDebugPrivilege 1640 taskkill.exe Token: SeDebugPrivilege 1152 taskkill.exe Token: SeDebugPrivilege 404 taskkill.exe Token: SeDebugPrivilege 912 snpt.exe Token: SeDebugPrivilege 1952 snpt.exe Token: SeTakeOwnershipPrivilege 2232 snpt.exe Token: SeTcbPrivilege 2232 snpt.exe Token: SeTcbPrivilege 2232 snpt.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 912 snpt.exe 3760 snpt.exe 1952 snpt.exe 2232 snpt.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 908 wrote to memory of 780 908 9b1bd4ac06317156fdd4d2cb6b416ed81ad2785ca3d14370f39b16dcde4aba36.exe 68 PID 908 wrote to memory of 780 908 9b1bd4ac06317156fdd4d2cb6b416ed81ad2785ca3d14370f39b16dcde4aba36.exe 68 PID 908 wrote to memory of 780 908 9b1bd4ac06317156fdd4d2cb6b416ed81ad2785ca3d14370f39b16dcde4aba36.exe 68 PID 780 wrote to memory of 3512 780 cmd.exe 70 PID 780 wrote to memory of 3512 780 cmd.exe 70 PID 780 wrote to memory of 3512 780 cmd.exe 70 PID 780 wrote to memory of 3020 780 cmd.exe 72 PID 780 wrote to memory of 3020 780 cmd.exe 72 PID 780 wrote to memory of 3020 780 cmd.exe 72 PID 780 wrote to memory of 3940 780 cmd.exe 73 PID 780 wrote to memory of 3940 780 cmd.exe 73 PID 780 wrote to memory of 3940 780 cmd.exe 73 PID 780 wrote to memory of 1264 780 cmd.exe 74 PID 780 wrote to memory of 1264 780 cmd.exe 74 PID 780 wrote to memory of 1264 780 cmd.exe 74 PID 780 wrote to memory of 1684 780 cmd.exe 75 PID 780 wrote to memory of 1684 780 cmd.exe 75 PID 780 wrote to memory of 1684 780 cmd.exe 75 PID 780 wrote to memory of 1516 780 cmd.exe 76 PID 780 wrote to memory of 1516 780 cmd.exe 76 PID 780 wrote to memory of 1516 780 cmd.exe 76 PID 780 wrote to memory of 1640 780 cmd.exe 77 PID 780 wrote to memory of 1640 780 cmd.exe 77 PID 780 wrote to memory of 1640 780 cmd.exe 77 PID 780 wrote to memory of 1152 780 cmd.exe 78 PID 780 wrote to memory of 1152 780 cmd.exe 78 PID 780 wrote to memory of 1152 780 cmd.exe 78 PID 780 wrote to memory of 404 780 cmd.exe 79 PID 780 wrote to memory of 404 780 cmd.exe 79 PID 780 wrote to memory of 404 780 cmd.exe 79 PID 780 wrote to memory of 2972 780 cmd.exe 80 PID 780 wrote to memory of 2972 780 cmd.exe 80 PID 780 wrote to memory of 2972 780 cmd.exe 80 PID 780 wrote to memory of 1676 780 cmd.exe 81 PID 780 wrote to memory of 1676 780 cmd.exe 81 PID 780 wrote to memory of 1676 780 cmd.exe 81 PID 780 wrote to memory of 3556 780 cmd.exe 82 PID 780 wrote to memory of 3556 780 cmd.exe 82 PID 780 wrote to memory of 3556 780 cmd.exe 82 PID 780 wrote to memory of 912 780 cmd.exe 83 PID 780 wrote to memory of 912 780 cmd.exe 83 PID 780 wrote to memory of 912 780 cmd.exe 83 PID 780 wrote to memory of 3760 780 cmd.exe 84 PID 780 wrote to memory of 3760 780 cmd.exe 84 PID 780 wrote to memory of 3760 780 cmd.exe 84 PID 780 wrote to memory of 1952 780 cmd.exe 85 PID 780 wrote to memory of 1952 780 cmd.exe 85 PID 780 wrote to memory of 1952 780 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b1bd4ac06317156fdd4d2cb6b416ed81ad2785ca3d14370f39b16dcde4aba36.exe"C:\Users\Admin\AppData\Local\Temp\9b1bd4ac06317156fdd4d2cb6b416ed81ad2785ca3d14370f39b16dcde4aba36.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\Windows.bat2⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im svnhost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im systemsmss.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im svshost.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im systemswin.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im systems.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im systeminfo.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f3⤵PID:2972
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"3⤵
- Runs .reg file with regedit
PID:1676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\snpt.exesnpt.exe /silentinstall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\snpt.exesnpt.exe /firewall3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\snpt.exesnpt.exe /start3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\snpt.exeC:\Users\Admin\AppData\Local\Temp\snpt.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2232