Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 13:11
Behavioral task
behavioral1
Sample
42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe
Resource
win7-20220812-en
General
-
Target
42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe
-
Size
298KB
-
MD5
243d7b4337da35d8f4090e7382e49b74
-
SHA1
162d798a1c60da2733f801b42dd1c845f53a22c9
-
SHA256
42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266
-
SHA512
8ac7f3bbc22f0a933aa62f7cc4394bdccd8c306eed292b34767fb937f1bb052941e903259c91434fba5000903f155c0058a9ef1a0a7402dc1452884c90ce2653
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYE:v6Wq4aaE6KwyF5L0Y2D1PqLf
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 2040 svhost.exe 1928 svhost.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/files/0x00140000000054ab-60.dat upx behavioral1/memory/1496-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2040-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1928-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/2040-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1496-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1928-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\q: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1496-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/2040-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1928-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/2040-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1496-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1928-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 2040 svhost.exe 1928 svhost.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 2040 svhost.exe 1928 svhost.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1928 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 2040 svhost.exe 2040 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe 1928 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2040 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 27 PID 1496 wrote to memory of 2040 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 27 PID 1496 wrote to memory of 2040 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 27 PID 1496 wrote to memory of 2040 1496 42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe 27 PID 2040 wrote to memory of 1928 2040 svhost.exe 28 PID 2040 wrote to memory of 1928 2040 svhost.exe 28 PID 2040 wrote to memory of 1928 2040 svhost.exe 28 PID 2040 wrote to memory of 1928 2040 svhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe"C:\Users\Admin\AppData\Local\Temp\42c0d510cdfa459431b44bed505ebfb2a54901ebc745758a77f41daee72d8266.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5d5f079111c66a280d6eaacbd1ba3b127
SHA15507c633971f2bee6346e86a1b62889b8f914908
SHA256c8f2d2eeb1bb915b5c88cf5a3f38823efadfc5b6aaeae26c92f54076235e3e19
SHA5126c420c58743bfca8f0cc89d884bdd599aeda777416162dbc2c776e4f5379688adf07b93fe869d54814079fd11bbda9c25b2f408e97ea79222b353c06143e2014
-
Filesize
298KB
MD5d5f079111c66a280d6eaacbd1ba3b127
SHA15507c633971f2bee6346e86a1b62889b8f914908
SHA256c8f2d2eeb1bb915b5c88cf5a3f38823efadfc5b6aaeae26c92f54076235e3e19
SHA5126c420c58743bfca8f0cc89d884bdd599aeda777416162dbc2c776e4f5379688adf07b93fe869d54814079fd11bbda9c25b2f408e97ea79222b353c06143e2014
-
Filesize
298KB
MD5d5f079111c66a280d6eaacbd1ba3b127
SHA15507c633971f2bee6346e86a1b62889b8f914908
SHA256c8f2d2eeb1bb915b5c88cf5a3f38823efadfc5b6aaeae26c92f54076235e3e19
SHA5126c420c58743bfca8f0cc89d884bdd599aeda777416162dbc2c776e4f5379688adf07b93fe869d54814079fd11bbda9c25b2f408e97ea79222b353c06143e2014