Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 03:10
Static task
static1
Behavioral task
behavioral1
Sample
942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe
Resource
win10v2004-20220901-en
General
-
Target
942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe
-
Size
552KB
-
MD5
c1dca394e84edbea87941342072c82cc
-
SHA1
32b4f5aff7fbe60b21efe6a71263cb702d0030e1
-
SHA256
942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e
-
SHA512
2f525867ae31599e9f9cb7c155958220859419a3fe2d4fbd5024648c7c5aae0a2e2dccb4afc3784a2b56090b693d9fbf9a6fc304b1700158a47da33cc4b2cfc5
-
SSDEEP
12288:60vQwJcJmLoMIOABV2AWzj6b7MP+Dd2dvI4MW7K7yRLVVZLVMq:663Jwr3VgO7MP+h2/N7KwnIq
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1304 EmailSpiderEasy.exe 672 what.exe 1912 what.exe -
Loads dropped DLL 4 IoCs
pid Process 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 EmailSpiderEasy.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\what.exe 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 672 set thread context of 1912 672 what.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\TypeLib\ = "{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}" EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\Control EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\InprocServer32\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\MiscStatus EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\MiscStatus\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\Programmable EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\0\win32 EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\HELPDIR EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\VersionIndependentProgID EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\InprocServer32 EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\Programmable\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\FLAGS EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\ = "Microsoft LOBi 1.0 Client Support Type Library" EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\0 EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\InprocServer32\ = "%systemroot%\\SysWow64\\mstscax.dll" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\ProgID\ = "MsRDP.MsRDP.2.a" EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1} EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\0\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\Version\ = "1.0" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\VersionIndependentProgID\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1} EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\ToolboxBitmap32 EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\ToolboxBitmap32\ = "%systemroot%\\SysWow64\\mstscax.dll, 1" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\TypeLib EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\VersionIndependentProgID\ = "MsRDP.MsRDP" EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\ProgID EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0 EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\0\win32\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\FLAGS\ = "4" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\HELPDIR\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\ = "Hicam.Egipwow object" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\ToolboxBitmap32\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\0\win32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\BCSLaunch.dll" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1FD5C90D-CB1E-1872-CD91-86E07E48C4E1}\1.0\FLAGS\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\Version EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\Version\ EmailSpiderEasy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\Control\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\MiscStatus\ = "0" EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\ProgID\ EmailSpiderEasy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B25EF411-A5A7-4C8F-668B-5E86EA8863E1}\TypeLib\ EmailSpiderEasy.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 1304 EmailSpiderEasy.exe 1304 EmailSpiderEasy.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1304 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 27 PID 1288 wrote to memory of 1304 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 27 PID 1288 wrote to memory of 1304 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 27 PID 1288 wrote to memory of 1304 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 27 PID 1288 wrote to memory of 672 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 28 PID 1288 wrote to memory of 672 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 28 PID 1288 wrote to memory of 672 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 28 PID 1288 wrote to memory of 672 1288 942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe 28 PID 672 wrote to memory of 1912 672 what.exe 29 PID 672 wrote to memory of 1912 672 what.exe 29 PID 672 wrote to memory of 1912 672 what.exe 29 PID 672 wrote to memory of 1912 672 what.exe 29 PID 672 wrote to memory of 1912 672 what.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe"C:\Users\Admin\AppData\Local\Temp\942ccb0c34ccc46b3f5b9566614932f7cb33bc93f09b0bd67a429a6b91c6125e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\EmailSpiderEasy.exe"C:\Users\Admin\AppData\Local\Temp\EmailSpiderEasy.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
C:\Windows\SysWOW64\what.exe"C:\Windows\System32\what.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\what.exeC:\Windows\SysWOW64\what.exe3⤵
- Executes dropped EXE
PID:1912
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5ed8b282b6cd370827713b10d84d81678
SHA1b21318b05c39c7353544212bd174fef78a44af77
SHA256e9fb07c8434da7ee1576b82ad967ab0d5b9921c66eaf19556965dbf64ec71b54
SHA512eb800985588831605e1e3ecb671fd501c0c5e9b4502d231eca4ce250341278e65cac8c8509ac105bbb0fa8a4c94669f5a042d6f9a3ba1f4ee67ee9efb7aab4e6
-
Filesize
347KB
MD5ed8b282b6cd370827713b10d84d81678
SHA1b21318b05c39c7353544212bd174fef78a44af77
SHA256e9fb07c8434da7ee1576b82ad967ab0d5b9921c66eaf19556965dbf64ec71b54
SHA512eb800985588831605e1e3ecb671fd501c0c5e9b4502d231eca4ce250341278e65cac8c8509ac105bbb0fa8a4c94669f5a042d6f9a3ba1f4ee67ee9efb7aab4e6
-
Filesize
168KB
MD5be6e32476c201e2061668d4912db06b0
SHA1d546fc531097c9e973d56468360a10a25f5f4213
SHA256cafcbbb032950c399b21b804a9d1a93c6c595f8838a30da87535f45616f1ca93
SHA512dd053375289cc34078179d6ba17311fb9939243e37680967e13769460491e7903eb098f186e0c02eff2f0ff198a1162bb3063009d25aca28438e8ca128bdf178
-
Filesize
168KB
MD5be6e32476c201e2061668d4912db06b0
SHA1d546fc531097c9e973d56468360a10a25f5f4213
SHA256cafcbbb032950c399b21b804a9d1a93c6c595f8838a30da87535f45616f1ca93
SHA512dd053375289cc34078179d6ba17311fb9939243e37680967e13769460491e7903eb098f186e0c02eff2f0ff198a1162bb3063009d25aca28438e8ca128bdf178
-
Filesize
168KB
MD5be6e32476c201e2061668d4912db06b0
SHA1d546fc531097c9e973d56468360a10a25f5f4213
SHA256cafcbbb032950c399b21b804a9d1a93c6c595f8838a30da87535f45616f1ca93
SHA512dd053375289cc34078179d6ba17311fb9939243e37680967e13769460491e7903eb098f186e0c02eff2f0ff198a1162bb3063009d25aca28438e8ca128bdf178
-
Filesize
347KB
MD5ed8b282b6cd370827713b10d84d81678
SHA1b21318b05c39c7353544212bd174fef78a44af77
SHA256e9fb07c8434da7ee1576b82ad967ab0d5b9921c66eaf19556965dbf64ec71b54
SHA512eb800985588831605e1e3ecb671fd501c0c5e9b4502d231eca4ce250341278e65cac8c8509ac105bbb0fa8a4c94669f5a042d6f9a3ba1f4ee67ee9efb7aab4e6
-
Filesize
347KB
MD5ed8b282b6cd370827713b10d84d81678
SHA1b21318b05c39c7353544212bd174fef78a44af77
SHA256e9fb07c8434da7ee1576b82ad967ab0d5b9921c66eaf19556965dbf64ec71b54
SHA512eb800985588831605e1e3ecb671fd501c0c5e9b4502d231eca4ce250341278e65cac8c8509ac105bbb0fa8a4c94669f5a042d6f9a3ba1f4ee67ee9efb7aab4e6
-
Filesize
168KB
MD5be6e32476c201e2061668d4912db06b0
SHA1d546fc531097c9e973d56468360a10a25f5f4213
SHA256cafcbbb032950c399b21b804a9d1a93c6c595f8838a30da87535f45616f1ca93
SHA512dd053375289cc34078179d6ba17311fb9939243e37680967e13769460491e7903eb098f186e0c02eff2f0ff198a1162bb3063009d25aca28438e8ca128bdf178
-
Filesize
168KB
MD5be6e32476c201e2061668d4912db06b0
SHA1d546fc531097c9e973d56468360a10a25f5f4213
SHA256cafcbbb032950c399b21b804a9d1a93c6c595f8838a30da87535f45616f1ca93
SHA512dd053375289cc34078179d6ba17311fb9939243e37680967e13769460491e7903eb098f186e0c02eff2f0ff198a1162bb3063009d25aca28438e8ca128bdf178