Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 04:26
Static task
static1
Behavioral task
behavioral1
Sample
02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe
Resource
win10v2004-20220812-en
General
-
Target
02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe
-
Size
2.1MB
-
MD5
c53bc2e1dbc91fa353fff5671a9af5f2
-
SHA1
f3871a15fc5513622bb9a7c716811095d86c798a
-
SHA256
02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43
-
SHA512
7430021cf666533a3525df6b4d201fa99c0565a972d0b36b8357732cca23249374c5faa33e4519735dfe23dd4fff528f9d647100329206b14bc06cbb5673a7e5
-
SSDEEP
49152:r8GntthMrDaKGUMrAJJyGHDZOshZRg4bUTj5roB:Nt0rWuMsJJOMgg+5ri
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Drivers\mhyvxz.SYS 1188.exe -
Executes dropped EXE 1 IoCs
pid Process 804 1188.exe -
Sets DLL path for service in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\cppscn\Parameters\ServiceDll = "%SystemRoot%\\System32\\mhyvxz.fdf" 1188.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\cppscn\Parameters\ServiceDll = "%SystemRoot%\\System32\\mhyvxz.fdf" 1188.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\cppscn\Parameters\ServiceDll = "%SystemRoot%\\System32\\mhyvxz.fdf" 1188.exe -
Loads dropped DLL 4 IoCs
pid Process 1280 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe 1280 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe 804 1188.exe 1496 SVCHOST.EXE -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\__tmp_rar_sfx_access_check_7075503 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe File created C:\WINDOWS\SysWOW64\88.mpg 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe File opened for modification C:\WINDOWS\SysWOW64\88.mpg 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe File created C:\WINDOWS\SysWOW64\1188.exe 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe File opened for modification C:\WINDOWS\SysWOW64\1188.exe 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe File created C:\Windows\SysWOW64\041497.imi 1188.exe File created C:\Windows\SysWOW64\mhyvxz.fdf 1188.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1496 SVCHOST.EXE 1496 SVCHOST.EXE 1496 SVCHOST.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1280 wrote to memory of 804 1280 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe 28 PID 1280 wrote to memory of 804 1280 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe 28 PID 1280 wrote to memory of 804 1280 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe 28 PID 1280 wrote to memory of 804 1280 02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe"C:\Users\Admin\AppData\Local\Temp\02677edff4d9608b6b445362194ea931124a2ce469287357fb8087364edaeb43.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\WINDOWS\SysWOW64\1188.exe"C:\WINDOWS\system32\1188.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:804
-
-
C:\Windows\SysWOW64\SVCHOST.EXEC:\Windows\SysWOW64\SVCHOST.EXE -k cppscn1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ba9e5383a9d9499c4803eeccaf45f6e8
SHA1fcb7a394bc66ed6e9eb5008a7250e50a83e8d37f
SHA25641cccc7b24bb8d64c60a7b65e164036ebbc9bd52c94f7d060eeba991cbd28c18
SHA512f152376a39b49cac7f2ab7d3291451da0638e05c564da0be93b7da67652010700987d88e8d5f4fcdc24c817360199dd2039817e8666c09992c3ef16519e041c7
-
Filesize
64KB
MD5ba9e5383a9d9499c4803eeccaf45f6e8
SHA1fcb7a394bc66ed6e9eb5008a7250e50a83e8d37f
SHA25641cccc7b24bb8d64c60a7b65e164036ebbc9bd52c94f7d060eeba991cbd28c18
SHA512f152376a39b49cac7f2ab7d3291451da0638e05c564da0be93b7da67652010700987d88e8d5f4fcdc24c817360199dd2039817e8666c09992c3ef16519e041c7
-
Filesize
93KB
MD57a37827fa8bea3cf5f846392f2c07f24
SHA15260e79b357ca318a46197983fb35a000e5795e5
SHA25654da2ac1eb37d31a7287af3dc9e602372b1a1c33a430261fa4efa0572d027f78
SHA512bc914159f0152d80961a35898927e2dc9e98ffde987c518aa8ea64f6201784d7c70e9ff604a61094b5d1938cfb2f75279ec6b6eeade379ab602036ef0068af67
-
Filesize
64KB
MD5ba9e5383a9d9499c4803eeccaf45f6e8
SHA1fcb7a394bc66ed6e9eb5008a7250e50a83e8d37f
SHA25641cccc7b24bb8d64c60a7b65e164036ebbc9bd52c94f7d060eeba991cbd28c18
SHA512f152376a39b49cac7f2ab7d3291451da0638e05c564da0be93b7da67652010700987d88e8d5f4fcdc24c817360199dd2039817e8666c09992c3ef16519e041c7
-
Filesize
64KB
MD5ba9e5383a9d9499c4803eeccaf45f6e8
SHA1fcb7a394bc66ed6e9eb5008a7250e50a83e8d37f
SHA25641cccc7b24bb8d64c60a7b65e164036ebbc9bd52c94f7d060eeba991cbd28c18
SHA512f152376a39b49cac7f2ab7d3291451da0638e05c564da0be93b7da67652010700987d88e8d5f4fcdc24c817360199dd2039817e8666c09992c3ef16519e041c7
-
Filesize
93KB
MD57a37827fa8bea3cf5f846392f2c07f24
SHA15260e79b357ca318a46197983fb35a000e5795e5
SHA25654da2ac1eb37d31a7287af3dc9e602372b1a1c33a430261fa4efa0572d027f78
SHA512bc914159f0152d80961a35898927e2dc9e98ffde987c518aa8ea64f6201784d7c70e9ff604a61094b5d1938cfb2f75279ec6b6eeade379ab602036ef0068af67
-
Filesize
93KB
MD57a37827fa8bea3cf5f846392f2c07f24
SHA15260e79b357ca318a46197983fb35a000e5795e5
SHA25654da2ac1eb37d31a7287af3dc9e602372b1a1c33a430261fa4efa0572d027f78
SHA512bc914159f0152d80961a35898927e2dc9e98ffde987c518aa8ea64f6201784d7c70e9ff604a61094b5d1938cfb2f75279ec6b6eeade379ab602036ef0068af67