Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe
Resource
win10v2004-20220812-en
General
-
Target
946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe
-
Size
81KB
-
MD5
05e7536ed09a82de0ba2fa5c10078dd9
-
SHA1
5bbc2735a0cd0dc2ce2ae55cd27a01ff744e364d
-
SHA256
946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f
-
SHA512
567ae0a224da3ad961915ea557ca9a36361964bb2d288080179828efe4281dec599658e358eedc2796d7bd8c97226c4835c9adaaa9816e9d24c8cfe4f80f279b
-
SSDEEP
1536:6eH/koi+oI6O7omS+m0h67gprjDYfiCd1Oz09WuHLSIdZ5xszm5X/uZW7:N/kbanD672P7Cye7rSIdZ5xsLZW7
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Update Srv = "C:\\Windows\\winservxv\\svchost.exe" 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Update Srv = "C:\\Windows\\winservxv\\svchost.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1516 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 904 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe 904 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\winservxv\svchost.exe 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe File opened for modification C:\Windows\winservxv\svchost.exe 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe File created C:\Windows\winservxv\lsdzvz.dll svchost.exe File opened for modification C:\Windows\winservxv\lsdzvz.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 904 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe 1516 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 1516 904 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe 27 PID 904 wrote to memory of 1516 904 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe 27 PID 904 wrote to memory of 1516 904 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe 27 PID 904 wrote to memory of 1516 904 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe 27 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe"C:\Users\Admin\AppData\Local\Temp\946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f.exe"1⤵
- Adds policy Run key to start application
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:904 -
C:\Windows\winservxv\svchost.exe"C:\Windows\winservxv\svchost.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1516
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD505e7536ed09a82de0ba2fa5c10078dd9
SHA15bbc2735a0cd0dc2ce2ae55cd27a01ff744e364d
SHA256946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f
SHA512567ae0a224da3ad961915ea557ca9a36361964bb2d288080179828efe4281dec599658e358eedc2796d7bd8c97226c4835c9adaaa9816e9d24c8cfe4f80f279b
-
Filesize
81KB
MD505e7536ed09a82de0ba2fa5c10078dd9
SHA15bbc2735a0cd0dc2ce2ae55cd27a01ff744e364d
SHA256946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f
SHA512567ae0a224da3ad961915ea557ca9a36361964bb2d288080179828efe4281dec599658e358eedc2796d7bd8c97226c4835c9adaaa9816e9d24c8cfe4f80f279b
-
Filesize
81KB
MD505e7536ed09a82de0ba2fa5c10078dd9
SHA15bbc2735a0cd0dc2ce2ae55cd27a01ff744e364d
SHA256946872420a4abd63dde04f334a65c4e9baba486ac6f5704b9a53e80a7c8b419f
SHA512567ae0a224da3ad961915ea557ca9a36361964bb2d288080179828efe4281dec599658e358eedc2796d7bd8c97226c4835c9adaaa9816e9d24c8cfe4f80f279b