Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01/06/2022, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
z7w3x.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
z7w3x.exe
Resource
win10v2004-20220414-en
General
-
Target
z7w3x.exe
-
Size
621KB
-
MD5
753585e5e099b192cf8d7593dd5ef4bf
-
SHA1
68c5d6b38c9dd9e9e1e888386025352811147028
-
SHA256
e26b2ffb2ee711fc7b04d62911580560794ee4fa9b7fcfade65ee6ff2eed0274
-
SHA512
de96554eaa3971672f05228d26fc6cbe98c8a5b31d35b21c92256c4dfee24ec81a708d601e0be4b80a0a365f620e4b0582f6fcc950f29df2ed6233c8314494ce
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Horse.txt
https://icq.com/windows/
https://icq.im/HORSEMAGYAR
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\RevokeCopy.tiff z7w3x.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation z7w3x.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 100 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\z7w3x.exe\" e" z7w3x.exe Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Windows\CurrentVersion\Run z7w3x.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-1809750270-3141839489-3074374771-1000\desktop.ini z7w3x.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: z7w3x.exe File opened (read-only) \??\E: z7w3x.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 5036 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1316 powershell.exe 1316 powershell.exe 2348 z7w3x.exe 2348 z7w3x.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4052 wmic.exe Token: SeSecurityPrivilege 4052 wmic.exe Token: SeTakeOwnershipPrivilege 4052 wmic.exe Token: SeLoadDriverPrivilege 4052 wmic.exe Token: SeSystemProfilePrivilege 4052 wmic.exe Token: SeSystemtimePrivilege 4052 wmic.exe Token: SeProfSingleProcessPrivilege 4052 wmic.exe Token: SeIncBasePriorityPrivilege 4052 wmic.exe Token: SeCreatePagefilePrivilege 4052 wmic.exe Token: SeBackupPrivilege 4052 wmic.exe Token: SeRestorePrivilege 4052 wmic.exe Token: SeShutdownPrivilege 4052 wmic.exe Token: SeDebugPrivilege 4052 wmic.exe Token: SeSystemEnvironmentPrivilege 4052 wmic.exe Token: SeRemoteShutdownPrivilege 4052 wmic.exe Token: SeUndockPrivilege 4052 wmic.exe Token: SeManageVolumePrivilege 4052 wmic.exe Token: 33 4052 wmic.exe Token: 34 4052 wmic.exe Token: 35 4052 wmic.exe Token: 36 4052 wmic.exe Token: SeIncreaseQuotaPrivilege 4052 wmic.exe Token: SeSecurityPrivilege 4052 wmic.exe Token: SeTakeOwnershipPrivilege 4052 wmic.exe Token: SeLoadDriverPrivilege 4052 wmic.exe Token: SeSystemProfilePrivilege 4052 wmic.exe Token: SeSystemtimePrivilege 4052 wmic.exe Token: SeProfSingleProcessPrivilege 4052 wmic.exe Token: SeIncBasePriorityPrivilege 4052 wmic.exe Token: SeCreatePagefilePrivilege 4052 wmic.exe Token: SeBackupPrivilege 4052 wmic.exe Token: SeRestorePrivilege 4052 wmic.exe Token: SeShutdownPrivilege 4052 wmic.exe Token: SeDebugPrivilege 4052 wmic.exe Token: SeSystemEnvironmentPrivilege 4052 wmic.exe Token: SeRemoteShutdownPrivilege 4052 wmic.exe Token: SeUndockPrivilege 4052 wmic.exe Token: SeManageVolumePrivilege 4052 wmic.exe Token: 33 4052 wmic.exe Token: 34 4052 wmic.exe Token: 35 4052 wmic.exe Token: 36 4052 wmic.exe Token: SeBackupPrivilege 4696 vssvc.exe Token: SeRestorePrivilege 4696 vssvc.exe Token: SeAuditPrivilege 4696 vssvc.exe Token: SeDebugPrivilege 1316 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2348 wrote to memory of 4552 2348 z7w3x.exe 81 PID 2348 wrote to memory of 4552 2348 z7w3x.exe 81 PID 2348 wrote to memory of 4552 2348 z7w3x.exe 81 PID 4552 wrote to memory of 4176 4552 net.exe 84 PID 4552 wrote to memory of 4176 4552 net.exe 84 PID 4552 wrote to memory of 4176 4552 net.exe 84 PID 2348 wrote to memory of 4516 2348 z7w3x.exe 85 PID 2348 wrote to memory of 4516 2348 z7w3x.exe 85 PID 2348 wrote to memory of 4516 2348 z7w3x.exe 85 PID 2348 wrote to memory of 4052 2348 z7w3x.exe 87 PID 2348 wrote to memory of 4052 2348 z7w3x.exe 87 PID 2348 wrote to memory of 4052 2348 z7w3x.exe 87 PID 2348 wrote to memory of 100 2348 z7w3x.exe 91 PID 2348 wrote to memory of 100 2348 z7w3x.exe 91 PID 2348 wrote to memory of 100 2348 z7w3x.exe 91 PID 2348 wrote to memory of 1316 2348 z7w3x.exe 93 PID 2348 wrote to memory of 1316 2348 z7w3x.exe 93 PID 2348 wrote to memory of 1316 2348 z7w3x.exe 93 PID 2348 wrote to memory of 3204 2348 z7w3x.exe 99 PID 2348 wrote to memory of 3204 2348 z7w3x.exe 99 PID 2348 wrote to memory of 3204 2348 z7w3x.exe 99 PID 3204 wrote to memory of 5036 3204 cmd.exe 102 PID 3204 wrote to memory of 5036 3204 cmd.exe 102 PID 3204 wrote to memory of 5036 3204 cmd.exe 102 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" z7w3x.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\z7w3x.exe"C:\Users\Admin\AppData\Local\Temp\z7w3x.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2348 -
C:\Windows\SysWOW64\net.exenet stop VSS & sc config VSS start= disabled2⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSS & sc config VSS start= disabled3⤵PID:4176
-
-
-
C:\Windows\SysWOW64\sc.exesc config VSS start= Demand & net start VSS2⤵PID:4516
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY delete /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe "{A-Z}:" /grant {Username}:F /T /C /Q2⤵
- Modifies file permissions
PID:100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "Get-WmiObject Win32_Shadowcopy | ForEach-Object {$_.Delete();}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout 1 && del "C:\Users\Admin\AppData\Local\Temp\z7w3x.exe" >> NUL2⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5036
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4696