Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 08:03
Behavioral task
behavioral1
Sample
7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe
Resource
win7-20220812-en
General
-
Target
7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe
-
Size
299KB
-
MD5
667b650e3390d38437db711a86646fe0
-
SHA1
269a29929b32aa12e816f14f8b4de70e7bb5a47b
-
SHA256
7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8
-
SHA512
0a948718fd4fc9b02654a38def19a699fcfd712e2416968c46a8eb3b42ee5d4e6d12d45f248612e9a4700f134481ae6dac4b71dd2fb2cbbce6b74e55e6959c6c
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYN:v6Wq4aaE6KwyF5L0Y2D1PqLe
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1312 svhost.exe 956 svhost.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/files/0x00140000000054ab-60.dat upx behavioral1/memory/1628-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1312-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/956-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1312-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/956-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1628-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\i: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1628-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1312-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/956-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1312-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/956-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1628-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 1312 svhost.exe 956 svhost.exe 956 svhost.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 956 svhost.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 1312 svhost.exe 956 svhost.exe 956 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 956 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 1312 svhost.exe 956 svhost.exe 956 svhost.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 956 svhost.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 1312 svhost.exe 1312 svhost.exe 956 svhost.exe 956 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 956 svhost.exe 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1312 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 28 PID 1628 wrote to memory of 1312 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 28 PID 1628 wrote to memory of 1312 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 28 PID 1628 wrote to memory of 1312 1628 7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe 28 PID 1312 wrote to memory of 956 1312 svhost.exe 29 PID 1312 wrote to memory of 956 1312 svhost.exe 29 PID 1312 wrote to memory of 956 1312 svhost.exe 29 PID 1312 wrote to memory of 956 1312 svhost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe"C:\Users\Admin\AppData\Local\Temp\7b47a421b3a67289de62968470d2d8aa97c0613275a4c8b6a71c487e55e889d8.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD517b631f5d9dd7b351c64a16ce9105ed0
SHA1129ef0c564fb723dc53ed81034ef7415d84049d6
SHA25640188daede04285f7b07a917dcc3f3d3717f9192fc15f067b92bc9177ec29755
SHA51273bf24b7460485b891ec68278e2e5bc55ba3e63e3c653d820a04677969f4883d567e6b03ac28aec1aa58e65fdf67b1e7f76284b1c449fb9f1f474083b3af499e
-
Filesize
299KB
MD517b631f5d9dd7b351c64a16ce9105ed0
SHA1129ef0c564fb723dc53ed81034ef7415d84049d6
SHA25640188daede04285f7b07a917dcc3f3d3717f9192fc15f067b92bc9177ec29755
SHA51273bf24b7460485b891ec68278e2e5bc55ba3e63e3c653d820a04677969f4883d567e6b03ac28aec1aa58e65fdf67b1e7f76284b1c449fb9f1f474083b3af499e
-
Filesize
299KB
MD517b631f5d9dd7b351c64a16ce9105ed0
SHA1129ef0c564fb723dc53ed81034ef7415d84049d6
SHA25640188daede04285f7b07a917dcc3f3d3717f9192fc15f067b92bc9177ec29755
SHA51273bf24b7460485b891ec68278e2e5bc55ba3e63e3c653d820a04677969f4883d567e6b03ac28aec1aa58e65fdf67b1e7f76284b1c449fb9f1f474083b3af499e