Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 13:12
Behavioral task
behavioral1
Sample
58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe
Resource
win7-20220812-en
General
-
Target
58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe
-
Size
298KB
-
MD5
0f747d7d1037163f97b1183d464a66c9
-
SHA1
821b08704ae34bc1c5abf484bc174ea29dce0de0
-
SHA256
58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972
-
SHA512
abe76f761a7c8d603a27d442ee8cb19cc57bec3ae8c0fd0ede8b93ff9afd5fbe49b1dc319b9491bb7a409eef146f7278d39a92d305554c24094640f3a2e98d3d
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIY2:v6Wq4aaE6KwyF5L0Y2D1PqLb
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1716 svhost.exe 240 svhost.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/files/0x000c0000000054a8-60.dat upx behavioral1/memory/1652-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1716-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/240-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1652-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1716-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/240-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\t: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1652-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1716-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/240-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1652-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1716-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/240-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 240 svhost.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 1716 svhost.exe 1716 svhost.exe 1716 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe 240 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1716 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 28 PID 1652 wrote to memory of 1716 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 28 PID 1652 wrote to memory of 1716 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 28 PID 1652 wrote to memory of 1716 1652 58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe 28 PID 1716 wrote to memory of 240 1716 svhost.exe 29 PID 1716 wrote to memory of 240 1716 svhost.exe 29 PID 1716 wrote to memory of 240 1716 svhost.exe 29 PID 1716 wrote to memory of 240 1716 svhost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe"C:\Users\Admin\AppData\Local\Temp\58be66c07aee479ae72a1f3edab424b57718739591b98dcd2d801b5eae22b972.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:240
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5fdbd2c06c8138a75cbf2ae292827eff5
SHA1d24b2dff8f8c630bace4f39e988862addedb63ef
SHA2567cc8ed1b65a3dc345ceda5dd175f8b23e275107daf0bb5dc41a14662ddfb26b5
SHA5126619b1c5be93b373dc87acc349a28faaf3b0b2244b079dca69648987266b7992f8258efb42e732fd42eab890162a130f786df4662677bcea10a910eb85a4fd50
-
Filesize
298KB
MD5fdbd2c06c8138a75cbf2ae292827eff5
SHA1d24b2dff8f8c630bace4f39e988862addedb63ef
SHA2567cc8ed1b65a3dc345ceda5dd175f8b23e275107daf0bb5dc41a14662ddfb26b5
SHA5126619b1c5be93b373dc87acc349a28faaf3b0b2244b079dca69648987266b7992f8258efb42e732fd42eab890162a130f786df4662677bcea10a910eb85a4fd50
-
Filesize
298KB
MD5fdbd2c06c8138a75cbf2ae292827eff5
SHA1d24b2dff8f8c630bace4f39e988862addedb63ef
SHA2567cc8ed1b65a3dc345ceda5dd175f8b23e275107daf0bb5dc41a14662ddfb26b5
SHA5126619b1c5be93b373dc87acc349a28faaf3b0b2244b079dca69648987266b7992f8258efb42e732fd42eab890162a130f786df4662677bcea10a910eb85a4fd50