Analysis
-
max time kernel
154s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
02-08-2022 00:01
Static task
static1
Behavioral task
behavioral1
Sample
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe
Resource
win10v2004-20220721-en
General
-
Target
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe
-
Size
890KB
-
MD5
39235e9dc0c41d1c834311205707decb
-
SHA1
fbd32d7135ef784e94b8b0271b846392f7dce36e
-
SHA256
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e
-
SHA512
93cb831f6c1a085741fc8e70dd19ac37d3a76e7b3d5a0f6798c6c8ae8e4e1b3ceb9d88be16438739f31528baa272179c4d0f07aad3668d73c8f090ee10114001
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\holystone.exe" msiexec.exe -
XMRig Miner payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/636-78-0x0000000000400000-0x00000000004ED000-memory.dmp xmrig behavioral1/memory/636-80-0x0000000000400000-0x00000000004ED000-memory.dmp xmrig behavioral1/memory/636-81-0x0000000000400000-0x00000000004ED000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral1/memory/636-74-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral1/memory/636-76-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral1/memory/636-77-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral1/memory/636-78-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral1/memory/636-80-0x0000000000400000-0x00000000004ED000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exepid process 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exedescription pid process target process PID 2016 set thread context of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 1376 set thread context of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exepid process 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exenotepad.exedescription pid process Token: SeDebugPrivilege 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe Token: SeLockMemoryPrivilege 636 notepad.exe Token: SeLockMemoryPrivilege 636 notepad.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exedescription pid process target process PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1640 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe msiexec.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 2016 wrote to memory of 1376 2016 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe PID 1376 wrote to memory of 636 1376 5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe"C:\Users\Admin\AppData\Local\Temp\5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe2⤵
- Modifies WinLogon for persistence
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe"C:\Users\Admin\AppData\Local\Temp\5b5fb7165b3b08c4bb203335cca2a8b10863ce3624ea5382771092967660a14e.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\sHrhJDaCBu\cfgi"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548B
MD5d84b60d37ea5e8fdb8f69f872f77ed5f
SHA16dd312b42ebd731f96f4580d687bb2125d9ddb4b
SHA256503f536489bc9e69e8f472786690a4da9f69a293fe1788d1165eff0cc90ae01d
SHA512819d2b0504dab5556c9a8d8be473fcebf48e367220e4a019b4ff422c9c9ecb6d14fc3e6ea840e2d9294f541e8110241af61bc401840668bc8071890336560960
-
Filesize
68KB
MD5bebddeb593fa1302cea66faac25a9e3c
SHA19e8cce6ffa83fdc147b6dc83811db52d20261191
SHA256d7f58fd413f4976dace7b5e6c4c5dd5987a9d919e7c050052060c30a7d169b34
SHA5120e18ca3bd3c01c6b80301c83c9d964607e5df21bf5536e6f332b9cf84cc9a7c100a8a47deebd9ced8fbefd61549df13473139a2f23f3b98df2ba9f54c6c6fc6a
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6