Analysis
-
max time kernel
92s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe
Resource
win10v2004-20220901-en
General
-
Target
38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe
-
Size
26KB
-
MD5
4865ff8a527c4fc038424ed42e8e55a0
-
SHA1
daf8f79ab23baef102187ca8bf02272ddb47da78
-
SHA256
38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813
-
SHA512
6eb35bc33fead0f533256514ddfd2aaf3edb2c4ab7fb0e04d0647581453af8a7268ca3b37fdbb6e05ff32a9b34147c95ae8811fcd1c7a4a09ffc98d382324942
-
SSDEEP
384:+hsxv4x40qH3t0WE4JcKxudZ0eC4fN2W8HXVEu59uLS5U/ANpp4DDmyezlKqwN/J:+hsMqHfJcKG0ezd8HXVEu5TW2A//vOa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 940 svchost.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2028 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23556fb1360f366337f97c924e76ead3.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23556fb1360f366337f97c924e76ead3.exe svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 748 38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\23556fb1360f366337f97c924e76ead3 = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\" .." svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\23556fb1360f366337f97c924e76ead3 = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\" .." svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 940 svchost.exe 940 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 748 wrote to memory of 940 748 38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe 27 PID 748 wrote to memory of 940 748 38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe 27 PID 748 wrote to memory of 940 748 38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe 27 PID 748 wrote to memory of 940 748 38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe 27 PID 940 wrote to memory of 2028 940 svchost.exe 28 PID 940 wrote to memory of 2028 940 svchost.exe 28 PID 940 wrote to memory of 2028 940 svchost.exe 28 PID 940 wrote to memory of 2028 940 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe"C:\Users\Admin\AppData\Local\Temp\38e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" "svchost.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD54865ff8a527c4fc038424ed42e8e55a0
SHA1daf8f79ab23baef102187ca8bf02272ddb47da78
SHA25638e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813
SHA5126eb35bc33fead0f533256514ddfd2aaf3edb2c4ab7fb0e04d0647581453af8a7268ca3b37fdbb6e05ff32a9b34147c95ae8811fcd1c7a4a09ffc98d382324942
-
Filesize
26KB
MD54865ff8a527c4fc038424ed42e8e55a0
SHA1daf8f79ab23baef102187ca8bf02272ddb47da78
SHA25638e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813
SHA5126eb35bc33fead0f533256514ddfd2aaf3edb2c4ab7fb0e04d0647581453af8a7268ca3b37fdbb6e05ff32a9b34147c95ae8811fcd1c7a4a09ffc98d382324942
-
Filesize
26KB
MD54865ff8a527c4fc038424ed42e8e55a0
SHA1daf8f79ab23baef102187ca8bf02272ddb47da78
SHA25638e8948dece929508df099c2ea4947667b336545425468c548b2d05cd2891813
SHA5126eb35bc33fead0f533256514ddfd2aaf3edb2c4ab7fb0e04d0647581453af8a7268ca3b37fdbb6e05ff32a9b34147c95ae8811fcd1c7a4a09ffc98d382324942