Analysis
-
max time kernel
156s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 17:50
Static task
static1
Behavioral task
behavioral1
Sample
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe
Resource
win10v2004-20220718-en
General
-
Target
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe
-
Size
1.6MB
-
MD5
0ccf64103df597108d163158e56ce5e4
-
SHA1
2072a45a7a1e2f438692ea96e5c7116544ab1045
-
SHA256
4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d
-
SHA512
a727ed94666575739f981dd3371515809aa1315c25b28163b9b197dff47886b8b8eaf1790bf65c9284deede85569904a28f719c26d83db6093d4c32d63823a1a
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 904 3owyh.exe 1160 3owyh.exe 1728 3owyh.exe -
resource yara_rule behavioral1/memory/836-65-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/836-67-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/836-68-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/836-70-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/836-72-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/836-74-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/836-75-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/836-76-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1728-94-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1728-97-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1728-100-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1728-104-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1728-108-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/836-107-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1728-110-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1728-111-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1728-112-0x0000000001610000-0x000000000171E000-memory.dmp upx -
Loads dropped DLL 7 IoCs
pid Process 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 836 vbc.exe 836 vbc.exe 1160 3owyh.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ywEHCl = "C:\\ywEHClywEHCl\\ywEHCl.vbs" vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 904 set thread context of 836 904 3owyh.exe 28 PID 836 set thread context of 1160 836 vbc.exe 31 PID 1160 set thread context of 1728 1160 3owyh.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 904 3owyh.exe 904 3owyh.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 836 vbc.exe 1728 3owyh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1160 3owyh.exe 1728 3owyh.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 980 wrote to memory of 904 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 27 PID 980 wrote to memory of 904 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 27 PID 980 wrote to memory of 904 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 27 PID 980 wrote to memory of 904 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 27 PID 980 wrote to memory of 904 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 27 PID 980 wrote to memory of 904 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 27 PID 980 wrote to memory of 904 980 4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe 27 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 904 wrote to memory of 836 904 3owyh.exe 28 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 836 wrote to memory of 1160 836 vbc.exe 31 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32 PID 1160 wrote to memory of 1728 1160 3owyh.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe"C:\Users\Admin\AppData\Local\Temp\4e5e3f7429f8c54a7846ceff7c6204e475b811ffebd757cab696414dd209079d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe"C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe"C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Roaming\nl38n\3owyh.exeC:\Users\Admin\AppData\Roaming\nl38n\3owyh.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD50097ffd3c0d7fee5deb04c5503189995
SHA192a5fc2e5e49b721ff98c6869f164c167fd78e07
SHA256b7b9c173d28df1e581f50c2eb321323afdd8bba308ae01fd23402e15b31941f3
SHA512f38ee1af1c752a0c87633f87673818d822d710dd1ed8b6020951c8df59272d8401228d68973f507a193516b1fcc0f5e28bd9bfb7c3fd5c73c7a3f7dae5d3bcda
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
762KB
MD501a807aea39b73d2192b226291491887
SHA18e08cbb41328addc82fab9747685d8689ce61ceb
SHA25608807a623324f15250520002a731eb6c9385a14cdc47821049a2a2b5bac76148
SHA512abb1dc7a415f5e1358013883d2d69c7888109dcca47fab06312848483fdf7fc78366b5ef8dcfc978bafadd55ac8f24d2b5e9109970e072c5199be4d428912c31
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852