Analysis
-
max time kernel
98s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe
Resource
win10v2004-20220414-en
General
-
Target
422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe
-
Size
395KB
-
MD5
21ca840d524b862b43421ce8119ca7a8
-
SHA1
da7271cd8618d4edb72fa704c82e8b7e53c2e9a8
-
SHA256
422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579
-
SHA512
4fcb8916e825193eb38983357dfd7f2b8c979d918257dc4dfc7e7a8f5330274eb4ef747766650affd564b65b3e39c8e876c43ec6a542cfbf47452cb490ccb9ac
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\5085c287f2253d50ffa8\\AutoReg.exe\"" AutoReg.exe -
Executes dropped EXE 2 IoCs
pid Process 1748 AutoReg.exe 1772 AutoReg.exe -
Deletes itself 1 IoCs
pid Process 1772 AutoReg.exe -
Loads dropped DLL 4 IoCs
pid Process 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 1260 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 1748 AutoReg.exe 1748 AutoReg.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: AutoReg.exe File opened (read-only) \??\I: AutoReg.exe File opened (read-only) \??\K: AutoReg.exe File opened (read-only) \??\L: AutoReg.exe File opened (read-only) \??\O: AutoReg.exe File opened (read-only) \??\A: AutoReg.exe File opened (read-only) \??\B: AutoReg.exe File opened (read-only) \??\F: AutoReg.exe File opened (read-only) \??\V: AutoReg.exe File opened (read-only) \??\X: AutoReg.exe File opened (read-only) \??\E: AutoReg.exe File opened (read-only) \??\M: AutoReg.exe File opened (read-only) \??\P: AutoReg.exe File opened (read-only) \??\Y: AutoReg.exe File opened (read-only) \??\Z: AutoReg.exe File opened (read-only) \??\G: AutoReg.exe File opened (read-only) \??\U: AutoReg.exe File opened (read-only) \??\W: AutoReg.exe File opened (read-only) \??\R: AutoReg.exe File opened (read-only) \??\S: AutoReg.exe File opened (read-only) \??\T: AutoReg.exe File opened (read-only) \??\J: AutoReg.exe File opened (read-only) \??\N: AutoReg.exe File opened (read-only) \??\Q: AutoReg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1092 set thread context of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1748 set thread context of 1772 1748 AutoReg.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1240 1776 WerFault.exe 30 -
NSIS installer 10 IoCs
resource yara_rule behavioral1/files/0x000600000001467b-58.dat nsis_installer_1 behavioral1/files/0x000600000001467b-58.dat nsis_installer_2 behavioral1/files/0x000600000001467b-60.dat nsis_installer_1 behavioral1/files/0x000600000001467b-60.dat nsis_installer_2 behavioral1/files/0x000600000001467b-62.dat nsis_installer_1 behavioral1/files/0x000600000001467b-62.dat nsis_installer_2 behavioral1/files/0x000600000001467b-65.dat nsis_installer_1 behavioral1/files/0x000600000001467b-65.dat nsis_installer_2 behavioral1/files/0x000600000001467b-67.dat nsis_installer_1 behavioral1/files/0x000600000001467b-67.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 700 powershell.exe 1772 AutoReg.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 1748 AutoReg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 700 powershell.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1092 wrote to memory of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1092 wrote to memory of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1092 wrote to memory of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1092 wrote to memory of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1092 wrote to memory of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1092 wrote to memory of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1092 wrote to memory of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1092 wrote to memory of 1260 1092 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 27 PID 1260 wrote to memory of 1748 1260 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 28 PID 1260 wrote to memory of 1748 1260 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 28 PID 1260 wrote to memory of 1748 1260 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 28 PID 1260 wrote to memory of 1748 1260 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 28 PID 1260 wrote to memory of 1748 1260 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 28 PID 1260 wrote to memory of 1748 1260 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 28 PID 1260 wrote to memory of 1748 1260 422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe 28 PID 1748 wrote to memory of 1772 1748 AutoReg.exe 29 PID 1748 wrote to memory of 1772 1748 AutoReg.exe 29 PID 1748 wrote to memory of 1772 1748 AutoReg.exe 29 PID 1748 wrote to memory of 1772 1748 AutoReg.exe 29 PID 1748 wrote to memory of 1772 1748 AutoReg.exe 29 PID 1748 wrote to memory of 1772 1748 AutoReg.exe 29 PID 1748 wrote to memory of 1772 1748 AutoReg.exe 29 PID 1748 wrote to memory of 1772 1748 AutoReg.exe 29 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1772 wrote to memory of 1776 1772 AutoReg.exe 30 PID 1776 wrote to memory of 1240 1776 secinit.exe 31 PID 1776 wrote to memory of 1240 1776 secinit.exe 31 PID 1776 wrote to memory of 1240 1776 secinit.exe 31 PID 1776 wrote to memory of 1240 1776 secinit.exe 31 PID 1772 wrote to memory of 700 1772 AutoReg.exe 32 PID 1772 wrote to memory of 700 1772 AutoReg.exe 32 PID 1772 wrote to memory of 700 1772 AutoReg.exe 32 PID 1772 wrote to memory of 700 1772 AutoReg.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe"C:\Users\Admin\AppData\Local\Temp\422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe"C:\Users\Admin\AppData\Local\Temp\422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\ProgramData\5085c287f2253d50ffa8\AutoReg.exeC:\ProgramData\5085c287f2253d50ffa8\AutoReg.exe "C:\Users\Admin\AppData\Local\Temp\422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe" ensgJJ3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\ProgramData\5085c287f2253d50ffa8\AutoReg.exeC:\ProgramData\5085c287f2253d50ffa8\AutoReg.exe "C:\Users\Admin\AppData\Local\Temp\422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579.exe" ensgJJ4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\5085c287f2253d50ffa8\AutoReg.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 2006⤵
- Program crash
PID:1240
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\5085c287f2253d50ffa8}"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD521ca840d524b862b43421ce8119ca7a8
SHA1da7271cd8618d4edb72fa704c82e8b7e53c2e9a8
SHA256422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579
SHA5124fcb8916e825193eb38983357dfd7f2b8c979d918257dc4dfc7e7a8f5330274eb4ef747766650affd564b65b3e39c8e876c43ec6a542cfbf47452cb490ccb9ac
-
Filesize
395KB
MD521ca840d524b862b43421ce8119ca7a8
SHA1da7271cd8618d4edb72fa704c82e8b7e53c2e9a8
SHA256422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579
SHA5124fcb8916e825193eb38983357dfd7f2b8c979d918257dc4dfc7e7a8f5330274eb4ef747766650affd564b65b3e39c8e876c43ec6a542cfbf47452cb490ccb9ac
-
Filesize
395KB
MD521ca840d524b862b43421ce8119ca7a8
SHA1da7271cd8618d4edb72fa704c82e8b7e53c2e9a8
SHA256422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579
SHA5124fcb8916e825193eb38983357dfd7f2b8c979d918257dc4dfc7e7a8f5330274eb4ef747766650affd564b65b3e39c8e876c43ec6a542cfbf47452cb490ccb9ac
-
Filesize
395KB
MD521ca840d524b862b43421ce8119ca7a8
SHA1da7271cd8618d4edb72fa704c82e8b7e53c2e9a8
SHA256422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579
SHA5124fcb8916e825193eb38983357dfd7f2b8c979d918257dc4dfc7e7a8f5330274eb4ef747766650affd564b65b3e39c8e876c43ec6a542cfbf47452cb490ccb9ac
-
Filesize
395KB
MD521ca840d524b862b43421ce8119ca7a8
SHA1da7271cd8618d4edb72fa704c82e8b7e53c2e9a8
SHA256422c8805c090ca0e7bf7b53ee5c0a2d66c2e1d38ab54797d7c46ce72cf0d5579
SHA5124fcb8916e825193eb38983357dfd7f2b8c979d918257dc4dfc7e7a8f5330274eb4ef747766650affd564b65b3e39c8e876c43ec6a542cfbf47452cb490ccb9ac
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c