Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe
Resource
win10v2004-20220812-en
General
-
Target
58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe
-
Size
184KB
-
MD5
f0ad77a4e22b08be9ebf90073b061731
-
SHA1
b95dcccfb1b871181eaa74ba683f5f0edbda6cc7
-
SHA256
58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717
-
SHA512
e133b5564ae6df4c81749fe67095484ea7fd081a93f9805cabb3c490c1d0836683c92c53694bf87079a55c00ede5ad5ba4aeaf92328e386392b1301750669cb1
-
SSDEEP
3072:VWwAMlXL6KvWeRl6Knvmb7/D26DKcAA6vQOm34lK5/si+FS3:pX5VREKnvmb7/D26DKcV67m34E5/s7S
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tawas.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 tawas.exe -
Loads dropped DLL 2 IoCs
pid Process 1724 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe 1724 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe -
Adds Run key to start application 2 TTPs 54 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /t" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /F" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /y" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /G" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /p" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /e" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /E" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /X" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /A" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /o" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /h" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /Q" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /O" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /a" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /f" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /M" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /Y" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /z" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /r" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /V" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /g" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /c" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /d" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /L" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /b" tawas.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /K" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /T" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /U" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /I" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /B" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /x" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /j" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /R" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /l" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /i" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /C" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /q" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /H" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /J" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /Z" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /D" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /w" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /P" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /m" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /n" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /N" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /F" 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /W" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /v" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /s" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /S" tawas.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\tawas = "C:\\Users\\Admin\\tawas.exe /k" tawas.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ tawas.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1724 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe 1720 tawas.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1724 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe 1720 tawas.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1720 1724 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe 27 PID 1724 wrote to memory of 1720 1724 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe 27 PID 1724 wrote to memory of 1720 1724 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe 27 PID 1724 wrote to memory of 1720 1724 58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe"C:\Users\Admin\AppData\Local\Temp\58058fe1360db6dddfba47823dd7d6d6352dbe0a9324e091c94ef2ec7b0fd717.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\tawas.exe"C:\Users\Admin\tawas.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5ec30d0bd16cec43f858ec485e68c2e33
SHA1f1b9ae834ab4b7a23fd3c2193e0275d68ee51351
SHA256fae8ee1662d5a13555ac845a0d90d3dca0baa01122cbb4748b7e2c94b6a6778c
SHA512231a70821fe1f0a3c34617b87c805517d754847cf2e69258b93e0e85bb960d64373da76fb969463a5f4f2caff0163c10a5ef0cca8c9687b124ca07109654eaf7
-
Filesize
184KB
MD5ec30d0bd16cec43f858ec485e68c2e33
SHA1f1b9ae834ab4b7a23fd3c2193e0275d68ee51351
SHA256fae8ee1662d5a13555ac845a0d90d3dca0baa01122cbb4748b7e2c94b6a6778c
SHA512231a70821fe1f0a3c34617b87c805517d754847cf2e69258b93e0e85bb960d64373da76fb969463a5f4f2caff0163c10a5ef0cca8c9687b124ca07109654eaf7
-
Filesize
184KB
MD5ec30d0bd16cec43f858ec485e68c2e33
SHA1f1b9ae834ab4b7a23fd3c2193e0275d68ee51351
SHA256fae8ee1662d5a13555ac845a0d90d3dca0baa01122cbb4748b7e2c94b6a6778c
SHA512231a70821fe1f0a3c34617b87c805517d754847cf2e69258b93e0e85bb960d64373da76fb969463a5f4f2caff0163c10a5ef0cca8c9687b124ca07109654eaf7
-
Filesize
184KB
MD5ec30d0bd16cec43f858ec485e68c2e33
SHA1f1b9ae834ab4b7a23fd3c2193e0275d68ee51351
SHA256fae8ee1662d5a13555ac845a0d90d3dca0baa01122cbb4748b7e2c94b6a6778c
SHA512231a70821fe1f0a3c34617b87c805517d754847cf2e69258b93e0e85bb960d64373da76fb969463a5f4f2caff0163c10a5ef0cca8c9687b124ca07109654eaf7