Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 21:35
Static task
static1
Behavioral task
behavioral1
Sample
3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe
Resource
win10v2004-20220414-en
General
-
Target
3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe
-
Size
554KB
-
MD5
d8e04e51292b7a8f4a04495f8c3c54f0
-
SHA1
252a4f7798600abace1c718ddee159a0afff7d37
-
SHA256
3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67
-
SHA512
55cd6bd3912fea8ec18b597fd612f455276ae8ea8c756b2ae61c13f3e722203fc43b85fdbc572a1e524d8b1207bf785516a5f57cfb15306b6709db414b92fcda
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\egidwpob = "\"C:\\Windows\\ekygucyw.exe\"" explorer.exe -
Processes:
3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exedescription pid process target process PID 240 set thread context of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 1928 set thread context of 1108 1928 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe explorer.exe -
Drops file in Windows directory 2 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Windows\ekygucyw.exe explorer.exe File created C:\Windows\ekygucyw.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1756 vssadmin.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PhishingFilter explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exepid process 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 668 vssvc.exe Token: SeRestorePrivilege 668 vssvc.exe Token: SeAuditPrivilege 668 vssvc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exeexplorer.exedescription pid process target process PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 240 wrote to memory of 1928 240 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe PID 1928 wrote to memory of 1108 1928 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe explorer.exe PID 1928 wrote to memory of 1108 1928 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe explorer.exe PID 1928 wrote to memory of 1108 1928 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe explorer.exe PID 1928 wrote to memory of 1108 1928 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe explorer.exe PID 1928 wrote to memory of 1108 1928 3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe explorer.exe PID 1108 wrote to memory of 1756 1108 explorer.exe vssadmin.exe PID 1108 wrote to memory of 1756 1108 explorer.exe vssadmin.exe PID 1108 wrote to memory of 1756 1108 explorer.exe vssadmin.exe PID 1108 wrote to memory of 1756 1108 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe"C:\Users\Admin\AppData\Local\Temp\3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe"C:\Users\Admin\AppData\Local\Temp\3e7d47574f5d777f7271f8f89ad1f0e8073aa8fa0379219bedf69114677caf67.exe"2⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\system32\explorer.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer Phishing Filter
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
PID:1756
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5b55b5441e076f53443b7bed658f6eacd
SHA1933be0c4d878e9c3e22e5508085ae10dcd6b4bca
SHA2567bc4de3f67c570bd41984f6f4cfd47911850dbb03b10cdfe5184e4055cc208b7
SHA512d692da940c5978cd872a4697581a0ad7acf0a5fc4acb5072be3937af235e9b8b8ff4cbe8f11aeb8d76fef7ebae1f353de54a548dd211076fdf58fdac8cb8df4c