Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 14:50
Behavioral task
behavioral1
Sample
47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe
Resource
win7-20220812-en
General
-
Target
47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe
-
Size
298KB
-
MD5
242b7f88b5fa9333e55956e11f59661b
-
SHA1
944bbfafe516e07149312eda923f94d713f38e5f
-
SHA256
47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7
-
SHA512
cd6c86120dbfc38be36c7c0b4b1dda1a8da58958fc68388d778f70445b83bca453c3b3dae0680a45a54ed36fba8b645582de550f84e1fb899b4d2bf70c9eba2a
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYR:v6Wq4aaE6KwyF5L0Y2D1PqLI
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1948 svhost.exe 972 svhost.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/files/0x000c0000000054a8-60.dat upx behavioral1/memory/1532-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1948-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/972-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1948-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/972-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1532-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\y: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1532-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1948-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/972-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1948-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/972-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1532-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 1948 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 972 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 1948 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 972 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1948 svhost.exe 1948 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe 972 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1532 wrote to memory of 1948 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 27 PID 1532 wrote to memory of 1948 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 27 PID 1532 wrote to memory of 1948 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 27 PID 1532 wrote to memory of 1948 1532 47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe 27 PID 1948 wrote to memory of 972 1948 svhost.exe 28 PID 1948 wrote to memory of 972 1948 svhost.exe 28 PID 1948 wrote to memory of 972 1948 svhost.exe 28 PID 1948 wrote to memory of 972 1948 svhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe"C:\Users\Admin\AppData\Local\Temp\47d9e4a5769898c1b8e55f8c604d995d4e6b1bf1990700c7019f362c64fa87b7.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:972
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5f8646ce3f289f93a7f659f80b767539c
SHA18b6c3aade413db0b2557040498ef052700eee59a
SHA2564cd18275f7a17151c8cb65422342b0bb88d5a84ca9364b45129a7aa95258b3c1
SHA5126d33a402d4461af4642863efd50a1e4026f648f937f3d5758edeb3a423504a8e6d0bd2b1d35fa8f03d376d8dc271972bdc330dc7b8662a285b4aed899db2e5f8
-
Filesize
298KB
MD5f8646ce3f289f93a7f659f80b767539c
SHA18b6c3aade413db0b2557040498ef052700eee59a
SHA2564cd18275f7a17151c8cb65422342b0bb88d5a84ca9364b45129a7aa95258b3c1
SHA5126d33a402d4461af4642863efd50a1e4026f648f937f3d5758edeb3a423504a8e6d0bd2b1d35fa8f03d376d8dc271972bdc330dc7b8662a285b4aed899db2e5f8
-
Filesize
298KB
MD5f8646ce3f289f93a7f659f80b767539c
SHA18b6c3aade413db0b2557040498ef052700eee59a
SHA2564cd18275f7a17151c8cb65422342b0bb88d5a84ca9364b45129a7aa95258b3c1
SHA5126d33a402d4461af4642863efd50a1e4026f648f937f3d5758edeb3a423504a8e6d0bd2b1d35fa8f03d376d8dc271972bdc330dc7b8662a285b4aed899db2e5f8