Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:55
Static task
static1
Behavioral task
behavioral1
Sample
b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe
Resource
win7-20220414-en
General
-
Target
b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe
-
Size
603KB
-
MD5
202a640b5da9a32d7050cf39eb0f7726
-
SHA1
d499984e6bd951514997ded82485e10844b329f6
-
SHA256
b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950
-
SHA512
20d46542201adab3da36a971f35cee594036ec3164bc990f9b7bba3b8a8d82c69e323a7b445b9a4045e4e3266e70e1b885d7c78e30ca34bdb111b2966ddb41c0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Dllhost.exepid process 1092 Dllhost.exe -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exepid process 2004 b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 7 IoCs
Processes:
b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exeDllhost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\CID\{78006D00-6900-3500-4D00-470059004100} b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\CID b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\CID\{78006D00-6900-3500-4D00-470059004100}\1 = "Evgbxea2DKZzh/U+YxcVXvD41ENZQmT9blZoTFtPfAWy0sKL5Z4kMHTNTHCX2BqUwBI5tWbtjSA2gIFm6REXxktcrd0OZ9TUrdeJNEjKNEWqE+lGSYyCKlbKDPxpns20K3y2lEidjCj1/QIBysRJ+tCfIS0mngh1op1vl6CW6Huxs+YpBovPt10o2ufIgqQRpihmZP2D+QIe2FC7WXzAPL/o1n0kVPSl06EI4a9a2B5PdPNs0E/8db6z/DrZsJRmrSl+BfM/d5StcW1YgcZ5BJ/N8Qvc68T0SpUaJKWDbZUBWucws1irMsXHuPuWUEAX60gdRZOcBkzn1lmyxrLtuZHEIkRWcLUTCOXEBhlJuAkcSkPxPH0QngdmBnLJ3r2THtQbZ8oZD6ZL1orn87HXJGgmCBuZPmHwsjWj1ykIVnwTengYLOSkYm+TLBhhwZ9KO0W2yRVBSYCNM9BRvVHWLw==" b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\CID\{45007100-4A00-5000-6F00-380074006A00} b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\CID\{45007100-4A00-5000-6F00-380074006A00}\1 = "7NIBxAIaKgV7A5/uTKUir3xoe/XFBsDAQJa248vV0RLLB8sVb5AEshVikaCZVol+MPl3b91uo84lQzTQ46Kr8qNKJ/hm0wAdg1gADSPxZUTdefOBCNUavcXWn+L71h9UpgyTGI4tLtJCxGQt8A83VExqVwlTs/aB0u8qBa+YuuHIsdnS1OMIzPf0+eygrwMH" b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\CID\{78006D00-6900-3500-4D00-470059004100}\1 = "Evgbxea2DKZzh/U+YxcVXvD41ENZQmT9blZoTFtPfAWy0sKL5Z4kMHTNTHCX2BqUwBI5tWbtjSA2gIFm6REXxktcrd0OZ9TUrdeJNEjKNEWqE+lGSYyCKlbKDPxpns20K3y2lEidjCj1/QIBysRJ+tCfIS0mngh1op1vl6CW6Huxs+YpBovPt10o2ufIgqQRpihmZP2D+QIe2FC7WXzAPL/o1n0kVPSl06EI4a9a2B5PdPNs0E/8db6z/DrZsJRmrSl+BfM/d5StcW1YgcZ5BJ/N8Qvc68T0SpUaJKWDbZUBWucws1irMsXHuPuWUEAX60gdRZOcBkzn1lmyxrLtuZHEIkRWcLUTCOXEBhlJuAkcSkPxPH0QngdmBnLJ3r2THtQbZ8oZD6ZL1orn87HXJGgmCBuZPmHwsjWj1ykIVnwTengYLOSkYm+TLBhhwZ9KO0W2yRVBSYCNM9BRvVHWLw==" Dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\CID\{45007100-4A00-5000-6F00-380074006A00}\1 = "YHvBfiDx9EmwIx5/keSJzNlKbPnPIibiUA1Wify0ZLcmys2MwE4E2a/rsLNzlUZhnSV3uEZxSb49rCxYmIcDrfiHtwnqasqD5KNEIszCTU1ZhxlWElJF2NTf2GTVudsms7KWfVvVtWgCTWIePy/34OF5pJUp9g8O5sAJ0p6JQqAQIxH7uzUf9s2MRnELAFMY" Dllhost.exe -
Modifies registry key 1 TTPs 1 IoCs
-
NTFS ADS 12 IoCs
Processes:
b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exeDllhost.exedescription ioc process File created C:\Users\Admin\Documents\My Music:{78006D00-6900-3500-4D00-470059004100} b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe File created C:\Users\Admin\Documents\My Music:{78006D00-6900-3500-4D00-470059004100} Dllhost.exe File created C:\MSOCache:{78006D00-6900-3500-4D00-470059004100} Dllhost.exe File created C:\Users\Admin\AppData\Local\Temp\InstallDir:{45007100-4A00-5000-6F00-380074006A00} Dllhost.exe File created C:\MSOCache:{45007100-4A00-5000-6F00-380074006A00} Dllhost.exe File created C:\Users\Admin\AppData\Local\Temp:{78006D00-6900-3500-4D00-470059004100} b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe File created C:\Users\Admin\AppData\Local\Temp:{45007100-4A00-5000-6F00-380074006A00} b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe File created C:\Users\Admin\Documents\My Music:{45007100-4A00-5000-6F00-380074006A00} b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe File created C:\MSOCache:{45007100-4A00-5000-6F00-380074006A00} b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe File created C:\Users\Admin\AppData\Local\Temp\InstallDir:{78006D00-6900-3500-4D00-470059004100} Dllhost.exe File created C:\Users\Admin\Documents\My Music:{45007100-4A00-5000-6F00-380074006A00} Dllhost.exe File created C:\MSOCache:{78006D00-6900-3500-4D00-470059004100} b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Dllhost.exepid process 1092 Dllhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Dllhost.exedescription pid process Token: SeDebugPrivilege 1092 Dllhost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exeDllhost.execmd.exedescription pid process target process PID 2004 wrote to memory of 1092 2004 b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Dllhost.exe PID 2004 wrote to memory of 1092 2004 b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Dllhost.exe PID 2004 wrote to memory of 1092 2004 b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Dllhost.exe PID 2004 wrote to memory of 1092 2004 b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe Dllhost.exe PID 1092 wrote to memory of 1816 1092 Dllhost.exe netsh.exe PID 1092 wrote to memory of 1816 1092 Dllhost.exe netsh.exe PID 1092 wrote to memory of 1816 1092 Dllhost.exe netsh.exe PID 1092 wrote to memory of 1816 1092 Dllhost.exe netsh.exe PID 1092 wrote to memory of 1340 1092 Dllhost.exe cmd.exe PID 1092 wrote to memory of 1340 1092 Dllhost.exe cmd.exe PID 1092 wrote to memory of 1340 1092 Dllhost.exe cmd.exe PID 1092 wrote to memory of 1340 1092 Dllhost.exe cmd.exe PID 1092 wrote to memory of 568 1092 Dllhost.exe netsh.exe PID 1092 wrote to memory of 568 1092 Dllhost.exe netsh.exe PID 1092 wrote to memory of 568 1092 Dllhost.exe netsh.exe PID 1092 wrote to memory of 568 1092 Dllhost.exe netsh.exe PID 1340 wrote to memory of 1172 1340 cmd.exe reg.exe PID 1340 wrote to memory of 1172 1340 cmd.exe reg.exe PID 1340 wrote to memory of 1172 1340 cmd.exe reg.exe PID 1340 wrote to memory of 1172 1340 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe"C:\Users\Admin\AppData\Local\Temp\b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\InstallDir\Dllhost.exe"C:\Users\Admin\AppData\Local\Temp\InstallDir\Dllhost.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\InstallDir\Dllhost.exe" "Dllhost.exe" ENABLE3⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- Modifies registry key
-
C:\Windows\SysWOW64\netsh.exenetsh.exe firewall set opmode disable3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Isolated Storage\{45007100-4A00-5000-6F00-380074006A00}Filesize
384B
MD504a5ed6c662fa4cb3812ed654fd3ef64
SHA1f04f736e6c84634430d318161139ca695e824836
SHA25642a4d298857893a33c5d6200c58fcf79407bce6a613fab662ff051246a1d9063
SHA5129f867c4784c803c77b5908fcf668f155056e154e3bca8ed8fe94b48cf970422e1bc3a357e4c3e65e0c6ba5e7a670237cc0ed704b8cc6a3965ff04682e1df0243
-
C:\Users\Admin\AppData\Local\Temp\MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\InstallDir\Dllhost.exeFilesize
603KB
MD5202a640b5da9a32d7050cf39eb0f7726
SHA1d499984e6bd951514997ded82485e10844b329f6
SHA256b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950
SHA51220d46542201adab3da36a971f35cee594036ec3164bc990f9b7bba3b8a8d82c69e323a7b445b9a4045e4e3266e70e1b885d7c78e30ca34bdb111b2966ddb41c0
-
C:\Users\Admin\AppData\Local\Temp\InstallDir\Dllhost.exeFilesize
603KB
MD5202a640b5da9a32d7050cf39eb0f7726
SHA1d499984e6bd951514997ded82485e10844b329f6
SHA256b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950
SHA51220d46542201adab3da36a971f35cee594036ec3164bc990f9b7bba3b8a8d82c69e323a7b445b9a4045e4e3266e70e1b885d7c78e30ca34bdb111b2966ddb41c0
-
\Users\Admin\AppData\Local\Temp\InstallDir\Dllhost.exeFilesize
603KB
MD5202a640b5da9a32d7050cf39eb0f7726
SHA1d499984e6bd951514997ded82485e10844b329f6
SHA256b266716ff41ca7d2a05994174c5f75083081c9dfd5b6fb8abb7f2a7c0e373950
SHA51220d46542201adab3da36a971f35cee594036ec3164bc990f9b7bba3b8a8d82c69e323a7b445b9a4045e4e3266e70e1b885d7c78e30ca34bdb111b2966ddb41c0
-
memory/568-66-0x0000000000000000-mapping.dmp
-
memory/1092-57-0x0000000000000000-mapping.dmp
-
memory/1092-62-0x0000000074650000-0x0000000074BFB000-memory.dmpFilesize
5.7MB
-
memory/1172-67-0x0000000000000000-mapping.dmp
-
memory/1340-65-0x0000000000000000-mapping.dmp
-
memory/1816-64-0x0000000000000000-mapping.dmp
-
memory/2004-54-0x0000000075521000-0x0000000075523000-memory.dmpFilesize
8KB
-
memory/2004-55-0x0000000074650000-0x0000000074BFB000-memory.dmpFilesize
5.7MB