Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 13:16
Behavioral task
behavioral1
Sample
27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe
Resource
win7-20220812-en
General
-
Target
27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe
-
Size
298KB
-
MD5
11f8c5fbc44e99a180150e5721ef6085
-
SHA1
b020e040f65130d99eb93578c2594fd1eb344a1b
-
SHA256
27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19
-
SHA512
a031677bfe59c498e600b3a26788dbc06e27f966a8e448578cc2c47009868cd09801222dffadded585187ab857d469e5f6f62a0601f68b21e8f771b5fbe1b96f
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYw:v6Wq4aaE6KwyF5L0Y2D1PqLr
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1672 svhost.exe 1552 svhost.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/files/0x00140000000054ab-60.dat upx behavioral1/memory/1760-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1672-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1552-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1672-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1760-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1552-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\a: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1760-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1672-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1552-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1672-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1760-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1552-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Driver.db svhost.exe File created C:\Windows\svhost.exe 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1672 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1672 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1672 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1672 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1672 svhost.exe 1552 svhost.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1672 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1672 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1672 svhost.exe 1672 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe 1552 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1672 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 28 PID 1760 wrote to memory of 1672 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 28 PID 1760 wrote to memory of 1672 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 28 PID 1760 wrote to memory of 1672 1760 27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe 28 PID 1672 wrote to memory of 1552 1672 svhost.exe 29 PID 1672 wrote to memory of 1552 1672 svhost.exe 29 PID 1672 wrote to memory of 1552 1672 svhost.exe 29 PID 1672 wrote to memory of 1552 1672 svhost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe"C:\Users\Admin\AppData\Local\Temp\27d8ec727dd507dcd3ef4b4dc8b08756cceeaccfc2aab599c69f5c3ed6d2db19.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1552
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD58be95fee216afa49f5542721bb55a842
SHA1fa04224ef4f69eee04cc655cff988704eaec78d0
SHA256720d5095435b89659d1daad4374fa7154951fef3277c4e4916eb05c63a6976e7
SHA51297844fff9710dc79b78cc6db203fb1260759c75ed5b3d17a6cb2756221ec2b26501237978e1b6f3d5a7946c1d65dd8ec6696c8acd84b64c86ea9600aede001e7
-
Filesize
298KB
MD58be95fee216afa49f5542721bb55a842
SHA1fa04224ef4f69eee04cc655cff988704eaec78d0
SHA256720d5095435b89659d1daad4374fa7154951fef3277c4e4916eb05c63a6976e7
SHA51297844fff9710dc79b78cc6db203fb1260759c75ed5b3d17a6cb2756221ec2b26501237978e1b6f3d5a7946c1d65dd8ec6696c8acd84b64c86ea9600aede001e7
-
Filesize
298KB
MD58be95fee216afa49f5542721bb55a842
SHA1fa04224ef4f69eee04cc655cff988704eaec78d0
SHA256720d5095435b89659d1daad4374fa7154951fef3277c4e4916eb05c63a6976e7
SHA51297844fff9710dc79b78cc6db203fb1260759c75ed5b3d17a6cb2756221ec2b26501237978e1b6f3d5a7946c1d65dd8ec6696c8acd84b64c86ea9600aede001e7