Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 08:03
Behavioral task
behavioral1
Sample
07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe
Resource
win7-20220812-en
General
-
Target
07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe
-
Size
299KB
-
MD5
66dbfacb58b123f40e5c72ddb0bbd980
-
SHA1
f6ed516aaff530f3fb7576b6167137e6431df973
-
SHA256
07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1
-
SHA512
e2d39b350a12528a6c33c78200b5a3885112e95d3cb376ac8cae8c140cbb2ab51231a21f945944c0419486a967522b9a11408d931c9dc5740415f373f48e2c96
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYz:v6Wq4aaE6KwyF5L0Y2D1PqLK
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 948 svhost.exe 1616 svhost.exe -
resource yara_rule behavioral1/memory/1284-55-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/files/0x000c0000000054a8-57.dat upx behavioral1/files/0x000c0000000054a8-59.dat upx behavioral1/files/0x000c0000000054a8-61.dat upx behavioral1/memory/948-63-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1616-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/948-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1284-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1616-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\z: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1284-55-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/948-63-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1616-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/948-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1284-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1616-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 948 svhost.exe 1616 svhost.exe 1616 svhost.exe 948 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 1616 svhost.exe 948 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 948 svhost.exe 948 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 948 svhost.exe 1616 svhost.exe 1616 svhost.exe 948 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 948 svhost.exe 1616 svhost.exe 948 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 948 svhost.exe 948 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe 1616 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1284 wrote to memory of 948 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 28 PID 1284 wrote to memory of 948 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 28 PID 1284 wrote to memory of 948 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 28 PID 1284 wrote to memory of 948 1284 07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe 28 PID 948 wrote to memory of 1616 948 svhost.exe 29 PID 948 wrote to memory of 1616 948 svhost.exe 29 PID 948 wrote to memory of 1616 948 svhost.exe 29 PID 948 wrote to memory of 1616 948 svhost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe"C:\Users\Admin\AppData\Local\Temp\07fbebee32801d313f0c4d61189a9539a7c9a23e81489b47358979b001c929c1.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1616
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299KB
MD5a825d539cc6e99ad3b7cca0a9ca2dfb4
SHA1c24de2ab02bb7adbcbdc30696074b057a72de5f3
SHA2562beedc5d2a50c31494ebeddd71c213e6b8f9336b95579779512ee26fdfdec09e
SHA51241d447cc449daf72d501962fb9ceca353d4978fe15681dc6bddc288d7680079b99655734acbd9b9c6e3cc36fa425278497d7c08075cedaa2650113b763610602
-
Filesize
299KB
MD5a825d539cc6e99ad3b7cca0a9ca2dfb4
SHA1c24de2ab02bb7adbcbdc30696074b057a72de5f3
SHA2562beedc5d2a50c31494ebeddd71c213e6b8f9336b95579779512ee26fdfdec09e
SHA51241d447cc449daf72d501962fb9ceca353d4978fe15681dc6bddc288d7680079b99655734acbd9b9c6e3cc36fa425278497d7c08075cedaa2650113b763610602
-
Filesize
299KB
MD5a825d539cc6e99ad3b7cca0a9ca2dfb4
SHA1c24de2ab02bb7adbcbdc30696074b057a72de5f3
SHA2562beedc5d2a50c31494ebeddd71c213e6b8f9336b95579779512ee26fdfdec09e
SHA51241d447cc449daf72d501962fb9ceca353d4978fe15681dc6bddc288d7680079b99655734acbd9b9c6e3cc36fa425278497d7c08075cedaa2650113b763610602