Analysis
-
max time kernel
152s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 13:15
Behavioral task
behavioral1
Sample
5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe
Resource
win7-20220901-en
General
-
Target
5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe
-
Size
298KB
-
MD5
15083efc3a09b2e27af27854f56f289c
-
SHA1
ce3d16928356c8113f6ce3e25406f7c3d02be010
-
SHA256
5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc
-
SHA512
25894565f2cd6c6f331becfdcbcee8f5179c6f26694491802547e74e6266e2b678515381f600b0cedbefb778183321acf5b04e66b9b4b0da0a6c24e2850456e4
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIY1:v6Wq4aaE6KwyF5L0Y2D1PqLi
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1584 svhost.exe 768 svhost.exe -
resource yara_rule behavioral1/files/0x0008000000005c51-56.dat upx behavioral1/files/0x0008000000005c51-58.dat upx behavioral1/files/0x0008000000005c51-60.dat upx behavioral1/memory/1516-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/768-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1584-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1584-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1516-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/768-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\v: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1516-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/768-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1584-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1584-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1516-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/768-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 1584 svhost.exe 768 svhost.exe 768 svhost.exe 1584 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1584 svhost.exe 1584 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1584 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 1584 svhost.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 1584 svhost.exe 768 svhost.exe 768 svhost.exe 1584 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1584 svhost.exe 1584 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1584 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1584 svhost.exe 1584 svhost.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe 768 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1584 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 27 PID 1516 wrote to memory of 1584 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 27 PID 1516 wrote to memory of 1584 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 27 PID 1516 wrote to memory of 1584 1516 5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe 27 PID 1584 wrote to memory of 768 1584 svhost.exe 28 PID 1584 wrote to memory of 768 1584 svhost.exe 28 PID 1584 wrote to memory of 768 1584 svhost.exe 28 PID 1584 wrote to memory of 768 1584 svhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe"C:\Users\Admin\AppData\Local\Temp\5b4e77581e1ba7afe58b610fdd783e27a11a4d5b415b23428c3083ff8a9f52fc.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:768
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5ce23848e46466028796e8f0324f9a17a
SHA1f3e5eb30db6a0041923eb80f388a35e1c1c37f7e
SHA256372bbcfdb6a3b70e5f45978bff9811dcaef6b8c14f9856f35c36335c42f0d5a7
SHA51251b31a13056b8405653a0acd7aaf044389815576689c64a255ed191be058317b30207e2cd1a6ec8e220d3ace482564c6d94cd259c7f9e9188b5e07f903592f73
-
Filesize
298KB
MD5ce23848e46466028796e8f0324f9a17a
SHA1f3e5eb30db6a0041923eb80f388a35e1c1c37f7e
SHA256372bbcfdb6a3b70e5f45978bff9811dcaef6b8c14f9856f35c36335c42f0d5a7
SHA51251b31a13056b8405653a0acd7aaf044389815576689c64a255ed191be058317b30207e2cd1a6ec8e220d3ace482564c6d94cd259c7f9e9188b5e07f903592f73
-
Filesize
298KB
MD5ce23848e46466028796e8f0324f9a17a
SHA1f3e5eb30db6a0041923eb80f388a35e1c1c37f7e
SHA256372bbcfdb6a3b70e5f45978bff9811dcaef6b8c14f9856f35c36335c42f0d5a7
SHA51251b31a13056b8405653a0acd7aaf044389815576689c64a255ed191be058317b30207e2cd1a6ec8e220d3ace482564c6d94cd259c7f9e9188b5e07f903592f73