Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:09
Static task
static1
Behavioral task
behavioral1
Sample
f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe
Resource
win10v2004-20220414-en
General
-
Target
f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe
-
Size
554KB
-
MD5
3ad90c3efdecc0984b6e4b6b411151e5
-
SHA1
422506ddf8fa1a1056173309e1c42343b2adebb7
-
SHA256
f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1
-
SHA512
f37f5110595f4e86e50671300567622e942648bb0f479529c0e15350d4b4fc58854fa54d1dea445569450828039d23d7c3e7221b2fc9a839c7e9e85e78ae6a2d
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rpydulel = "\"C:\\Windows\\atykiboq.exe\"" explorer.exe -
Processes:
f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exef6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exedescription pid process target process PID 784 set thread context of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 1880 set thread context of 2000 1880 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe explorer.exe -
Drops file in Windows directory 2 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\atykiboq.exe explorer.exe File created C:\Windows\atykiboq.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1944 vssadmin.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PhishingFilter explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exepid process 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1648 vssvc.exe Token: SeRestorePrivilege 1648 vssvc.exe Token: SeAuditPrivilege 1648 vssvc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exef6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exeexplorer.exedescription pid process target process PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 784 wrote to memory of 1880 784 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe PID 1880 wrote to memory of 2000 1880 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe explorer.exe PID 1880 wrote to memory of 2000 1880 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe explorer.exe PID 1880 wrote to memory of 2000 1880 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe explorer.exe PID 1880 wrote to memory of 2000 1880 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe explorer.exe PID 1880 wrote to memory of 2000 1880 f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe explorer.exe PID 2000 wrote to memory of 1944 2000 explorer.exe vssadmin.exe PID 2000 wrote to memory of 1944 2000 explorer.exe vssadmin.exe PID 2000 wrote to memory of 1944 2000 explorer.exe vssadmin.exe PID 2000 wrote to memory of 1944 2000 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe"C:\Users\Admin\AppData\Local\Temp\f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe"C:\Users\Admin\AppData\Local\Temp\f6445d2ba81a1f1d34600fd9fe7df82dbcdf264f35c7c7b5d9d7f3cc1ac682f1.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer Phishing Filter
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:1944
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD52d601ef3e9c58772c9f767ebad2f4822
SHA1d6f4fa5f7707c09083f0f40797ab036ff885cbfb
SHA256d06aaad109f8c4329bca028d0451bdbdd68eb8fdc1c0396843d75f9a88c52a45
SHA5129c389a5f9971a98628e98ab6b33948ade3173c0f11a445493260f67f5eed571e47e57dfe888e06b7464bc3534c346a3e82e605290063c18eef7daa168d849fcd