Analysis
-
max time kernel
45s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe
Resource
win10v2004-20220812-en
General
-
Target
017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe
-
Size
56KB
-
MD5
03537c8c6a2fe409887fae7425232540
-
SHA1
608a1243f9f0ae11a3107f44321cd05da9a38f61
-
SHA256
017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc
-
SHA512
48671da9c4de610864fc6a6f3f81ae8eae183da449dc6a44d79e99a82f17e10d9fb08454cb3d947ebb85e0e531c03319d27a8b8d54ee2587e62f86b09d721105
-
SSDEEP
768:jjIAHrJH5MTDUb0rc2O1Dmnag0xc1ChTsDoCoJOe2atoLQzJ4:Qyp6Dlrc2omN061ChTsDXe2aEQz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 844 scrss.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1680 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8c0a103b3db203be4aa4019bc5c6f51b.exe scrss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8c0a103b3db203be4aa4019bc5c6f51b.exe scrss.exe -
Loads dropped DLL 1 IoCs
pid Process 1444 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\8c0a103b3db203be4aa4019bc5c6f51b = "\"C:\\Users\\Admin\\scrss.exe\" .." scrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\8c0a103b3db203be4aa4019bc5c6f51b = "\"C:\\Users\\Admin\\scrss.exe\" .." scrss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 844 scrss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 844 scrss.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1444 wrote to memory of 844 1444 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe 27 PID 1444 wrote to memory of 844 1444 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe 27 PID 1444 wrote to memory of 844 1444 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe 27 PID 1444 wrote to memory of 844 1444 017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe 27 PID 844 wrote to memory of 1680 844 scrss.exe 28 PID 844 wrote to memory of 1680 844 scrss.exe 28 PID 844 wrote to memory of 1680 844 scrss.exe 28 PID 844 wrote to memory of 1680 844 scrss.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe"C:\Users\Admin\AppData\Local\Temp\017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\scrss.exe"C:\Users\Admin\scrss.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\scrss.exe" "scrss.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD503537c8c6a2fe409887fae7425232540
SHA1608a1243f9f0ae11a3107f44321cd05da9a38f61
SHA256017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc
SHA51248671da9c4de610864fc6a6f3f81ae8eae183da449dc6a44d79e99a82f17e10d9fb08454cb3d947ebb85e0e531c03319d27a8b8d54ee2587e62f86b09d721105
-
Filesize
56KB
MD503537c8c6a2fe409887fae7425232540
SHA1608a1243f9f0ae11a3107f44321cd05da9a38f61
SHA256017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc
SHA51248671da9c4de610864fc6a6f3f81ae8eae183da449dc6a44d79e99a82f17e10d9fb08454cb3d947ebb85e0e531c03319d27a8b8d54ee2587e62f86b09d721105
-
Filesize
56KB
MD503537c8c6a2fe409887fae7425232540
SHA1608a1243f9f0ae11a3107f44321cd05da9a38f61
SHA256017e5cc2f5d277a9949bfd5fd33cf859036f1de49c965b75b4761ba50a2b85dc
SHA51248671da9c4de610864fc6a6f3f81ae8eae183da449dc6a44d79e99a82f17e10d9fb08454cb3d947ebb85e0e531c03319d27a8b8d54ee2587e62f86b09d721105