Analysis

  • max time kernel
    171s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 06:39

General

  • Target

    963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178.exe

  • Size

    269KB

  • MD5

    64a7070244bed04fbf2eb9d05b5b4914

  • SHA1

    7d73f44ba1b082edce1fa4f6bf69ed50a7c76b03

  • SHA256

    963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178

  • SHA512

    9769cd702b5171a71b1d3ec41ded616635e1af755fd0171d91b352a18cb58abd57c180b94a7ddb716201443adc39bd9a2dcebfeb71e0067b6e0cffb97b450bd9

  • SSDEEP

    6144:zvEN2U+T6i5LirrllHy4HUcMQY6/fwz5R:zENN+T5xYrllrU7QY6ej

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178.exe
    "C:\Users\Admin\AppData\Local\Temp\963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1268
    • \??\c:\users\admin\appdata\local\temp\963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178.exe 
      c:\users\admin\appdata\local\temp\963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178.exe 
      2⤵
      • Executes dropped EXE
      PID:1492
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1760
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1480
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:596
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1232
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2008
            • C:\Windows\SysWOW64\at.exe
              at 17:54 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:1740
              • C:\Windows\SysWOW64\at.exe
                at 17:55 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:364
                • C:\Windows\SysWOW64\at.exe
                  at 17:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:1372

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178.exe 

          Filesize

          62KB

          MD5

          7970d49e7113da608446c879635d1eca

          SHA1

          251d4235b03f66ce3a2c6a2c9be65dad32d32227

          SHA256

          ac16659efbed17e56dd2e0bde80642e979a5f1b652620b7b5453d22ac98e4586

          SHA512

          67261c0774e29afc3a8d507ae8b71cb3fe8fcaf22545076cdf48c8d044a71ada821cb9a1850a51fdf8c356864eb41aec661e96ee783c61d1524250f0766376e9

        • C:\Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          206KB

          MD5

          2da853856a6b1c934348a49d4a885c8b

          SHA1

          af7e12fcc4284ea7c835692cfd93102c22d6d347

          SHA256

          9b461de778afdd8c9456e48e4497ea075fb50fe7b94ea6d6a4e757e9cb25d1ee

          SHA512

          4d3be225b41a994e53aec43940a7f8b072dc84a7384807a0751376a1dfb963e16756f97927cf27cfaa9141d7ccd6ed896966c23fb9d63c9179e8e0f11d25b263

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          207KB

          MD5

          66e2e820ea8adb10bd7bc8dd0067c73a

          SHA1

          e579cf604284b1196072db45f9cecbc8cb9b96a4

          SHA256

          fe76b8eacad54584ee32d06e2734421feef1c006f21dbce5101ae4f2404d3be7

          SHA512

          4ae86525fd39ad81c6a40582b7a8b3da0ce749ed54ecb186ab55acce751b62e17ef667ec4f61ced91643e47071b29ff394d4fdbbcc357db19b4d34a87b205332

        • C:\Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          21905f8a39f7d66a420e6dc97d88cbd3

          SHA1

          1745ee55de7ec072c5ed44715ad9732fe2a145dd

          SHA256

          be871631ade29773dd6ce54b8e2ac23c14f84d69393cb5cd2a576aa363c0dab8

          SHA512

          93d6261abde8de3a2a62d68fe69c5d2eb6594f6cd96b049948186bf5bbb9551580b9a207189f62f9a4b28fb85c63e14be5c9f419893387f4013b59f75b218f2d

        • C:\Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          17d88886d267b487f3d7b49e26112ee1

          SHA1

          77f2c35892bf4a24bc48610bc71f049113143ed4

          SHA256

          a7b90446e41f04daf882931686814485a14604096ae47baa8c033031e6d859db

          SHA512

          429ab30ad11c686bc596c7e82bdbde37af399dc167146485335a77c8c768797523685e91750b0972f1c1a1ed24a7c4e1b50691a04e2759eae94c28f6b90f5bea

        • C:\Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          17d88886d267b487f3d7b49e26112ee1

          SHA1

          77f2c35892bf4a24bc48610bc71f049113143ed4

          SHA256

          a7b90446e41f04daf882931686814485a14604096ae47baa8c033031e6d859db

          SHA512

          429ab30ad11c686bc596c7e82bdbde37af399dc167146485335a77c8c768797523685e91750b0972f1c1a1ed24a7c4e1b50691a04e2759eae94c28f6b90f5bea

        • C:\Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          b5a159f57938fa83b950466e8e0d1c2c

          SHA1

          d407b598973987b1d6a0bb64f3c975cb01ff0236

          SHA256

          a4acee8fd0ae12618285d6377a5ec79cccc367091e3cc9e96a9d978121e8a4a7

          SHA512

          77265dd9a38b31d04587fd50f4a64e0475a9e9e7a0032d75a3f66f4d72a08e3de1c3d6f7797d215601a6bec1e6dd9c080585b897ae8018f175932865e1b8fa02

        • \??\c:\users\admin\appdata\local\icsys.icn.exe

          Filesize

          206KB

          MD5

          2da853856a6b1c934348a49d4a885c8b

          SHA1

          af7e12fcc4284ea7c835692cfd93102c22d6d347

          SHA256

          9b461de778afdd8c9456e48e4497ea075fb50fe7b94ea6d6a4e757e9cb25d1ee

          SHA512

          4d3be225b41a994e53aec43940a7f8b072dc84a7384807a0751376a1dfb963e16756f97927cf27cfaa9141d7ccd6ed896966c23fb9d63c9179e8e0f11d25b263

        • \??\c:\windows\system\explorer.exe

          Filesize

          206KB

          MD5

          21905f8a39f7d66a420e6dc97d88cbd3

          SHA1

          1745ee55de7ec072c5ed44715ad9732fe2a145dd

          SHA256

          be871631ade29773dd6ce54b8e2ac23c14f84d69393cb5cd2a576aa363c0dab8

          SHA512

          93d6261abde8de3a2a62d68fe69c5d2eb6594f6cd96b049948186bf5bbb9551580b9a207189f62f9a4b28fb85c63e14be5c9f419893387f4013b59f75b218f2d

        • \??\c:\windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          17d88886d267b487f3d7b49e26112ee1

          SHA1

          77f2c35892bf4a24bc48610bc71f049113143ed4

          SHA256

          a7b90446e41f04daf882931686814485a14604096ae47baa8c033031e6d859db

          SHA512

          429ab30ad11c686bc596c7e82bdbde37af399dc167146485335a77c8c768797523685e91750b0972f1c1a1ed24a7c4e1b50691a04e2759eae94c28f6b90f5bea

        • \??\c:\windows\system\svchost.exe

          Filesize

          206KB

          MD5

          b5a159f57938fa83b950466e8e0d1c2c

          SHA1

          d407b598973987b1d6a0bb64f3c975cb01ff0236

          SHA256

          a4acee8fd0ae12618285d6377a5ec79cccc367091e3cc9e96a9d978121e8a4a7

          SHA512

          77265dd9a38b31d04587fd50f4a64e0475a9e9e7a0032d75a3f66f4d72a08e3de1c3d6f7797d215601a6bec1e6dd9c080585b897ae8018f175932865e1b8fa02

        • \Users\Admin\AppData\Local\Temp\963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178.exe 

          Filesize

          62KB

          MD5

          7970d49e7113da608446c879635d1eca

          SHA1

          251d4235b03f66ce3a2c6a2c9be65dad32d32227

          SHA256

          ac16659efbed17e56dd2e0bde80642e979a5f1b652620b7b5453d22ac98e4586

          SHA512

          67261c0774e29afc3a8d507ae8b71cb3fe8fcaf22545076cdf48c8d044a71ada821cb9a1850a51fdf8c356864eb41aec661e96ee783c61d1524250f0766376e9

        • \Users\Admin\AppData\Local\Temp\963c43762f7a22014eec6993b43d2fa5dd1c2c3f7f9012984f0e7b6fffb32178.exe 

          Filesize

          62KB

          MD5

          7970d49e7113da608446c879635d1eca

          SHA1

          251d4235b03f66ce3a2c6a2c9be65dad32d32227

          SHA256

          ac16659efbed17e56dd2e0bde80642e979a5f1b652620b7b5453d22ac98e4586

          SHA512

          67261c0774e29afc3a8d507ae8b71cb3fe8fcaf22545076cdf48c8d044a71ada821cb9a1850a51fdf8c356864eb41aec661e96ee783c61d1524250f0766376e9

        • \Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          206KB

          MD5

          2da853856a6b1c934348a49d4a885c8b

          SHA1

          af7e12fcc4284ea7c835692cfd93102c22d6d347

          SHA256

          9b461de778afdd8c9456e48e4497ea075fb50fe7b94ea6d6a4e757e9cb25d1ee

          SHA512

          4d3be225b41a994e53aec43940a7f8b072dc84a7384807a0751376a1dfb963e16756f97927cf27cfaa9141d7ccd6ed896966c23fb9d63c9179e8e0f11d25b263

        • \Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          206KB

          MD5

          2da853856a6b1c934348a49d4a885c8b

          SHA1

          af7e12fcc4284ea7c835692cfd93102c22d6d347

          SHA256

          9b461de778afdd8c9456e48e4497ea075fb50fe7b94ea6d6a4e757e9cb25d1ee

          SHA512

          4d3be225b41a994e53aec43940a7f8b072dc84a7384807a0751376a1dfb963e16756f97927cf27cfaa9141d7ccd6ed896966c23fb9d63c9179e8e0f11d25b263

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          21905f8a39f7d66a420e6dc97d88cbd3

          SHA1

          1745ee55de7ec072c5ed44715ad9732fe2a145dd

          SHA256

          be871631ade29773dd6ce54b8e2ac23c14f84d69393cb5cd2a576aa363c0dab8

          SHA512

          93d6261abde8de3a2a62d68fe69c5d2eb6594f6cd96b049948186bf5bbb9551580b9a207189f62f9a4b28fb85c63e14be5c9f419893387f4013b59f75b218f2d

        • \Windows\system\explorer.exe

          Filesize

          206KB

          MD5

          21905f8a39f7d66a420e6dc97d88cbd3

          SHA1

          1745ee55de7ec072c5ed44715ad9732fe2a145dd

          SHA256

          be871631ade29773dd6ce54b8e2ac23c14f84d69393cb5cd2a576aa363c0dab8

          SHA512

          93d6261abde8de3a2a62d68fe69c5d2eb6594f6cd96b049948186bf5bbb9551580b9a207189f62f9a4b28fb85c63e14be5c9f419893387f4013b59f75b218f2d

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          17d88886d267b487f3d7b49e26112ee1

          SHA1

          77f2c35892bf4a24bc48610bc71f049113143ed4

          SHA256

          a7b90446e41f04daf882931686814485a14604096ae47baa8c033031e6d859db

          SHA512

          429ab30ad11c686bc596c7e82bdbde37af399dc167146485335a77c8c768797523685e91750b0972f1c1a1ed24a7c4e1b50691a04e2759eae94c28f6b90f5bea

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          17d88886d267b487f3d7b49e26112ee1

          SHA1

          77f2c35892bf4a24bc48610bc71f049113143ed4

          SHA256

          a7b90446e41f04daf882931686814485a14604096ae47baa8c033031e6d859db

          SHA512

          429ab30ad11c686bc596c7e82bdbde37af399dc167146485335a77c8c768797523685e91750b0972f1c1a1ed24a7c4e1b50691a04e2759eae94c28f6b90f5bea

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          17d88886d267b487f3d7b49e26112ee1

          SHA1

          77f2c35892bf4a24bc48610bc71f049113143ed4

          SHA256

          a7b90446e41f04daf882931686814485a14604096ae47baa8c033031e6d859db

          SHA512

          429ab30ad11c686bc596c7e82bdbde37af399dc167146485335a77c8c768797523685e91750b0972f1c1a1ed24a7c4e1b50691a04e2759eae94c28f6b90f5bea

        • \Windows\system\spoolsv.exe

          Filesize

          206KB

          MD5

          17d88886d267b487f3d7b49e26112ee1

          SHA1

          77f2c35892bf4a24bc48610bc71f049113143ed4

          SHA256

          a7b90446e41f04daf882931686814485a14604096ae47baa8c033031e6d859db

          SHA512

          429ab30ad11c686bc596c7e82bdbde37af399dc167146485335a77c8c768797523685e91750b0972f1c1a1ed24a7c4e1b50691a04e2759eae94c28f6b90f5bea

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          b5a159f57938fa83b950466e8e0d1c2c

          SHA1

          d407b598973987b1d6a0bb64f3c975cb01ff0236

          SHA256

          a4acee8fd0ae12618285d6377a5ec79cccc367091e3cc9e96a9d978121e8a4a7

          SHA512

          77265dd9a38b31d04587fd50f4a64e0475a9e9e7a0032d75a3f66f4d72a08e3de1c3d6f7797d215601a6bec1e6dd9c080585b897ae8018f175932865e1b8fa02

        • \Windows\system\svchost.exe

          Filesize

          206KB

          MD5

          b5a159f57938fa83b950466e8e0d1c2c

          SHA1

          d407b598973987b1d6a0bb64f3c975cb01ff0236

          SHA256

          a4acee8fd0ae12618285d6377a5ec79cccc367091e3cc9e96a9d978121e8a4a7

          SHA512

          77265dd9a38b31d04587fd50f4a64e0475a9e9e7a0032d75a3f66f4d72a08e3de1c3d6f7797d215601a6bec1e6dd9c080585b897ae8018f175932865e1b8fa02

        • memory/1268-80-0x0000000002280000-0x00000000022A9000-memory.dmp

          Filesize

          164KB

        • memory/1268-57-0x0000000075211000-0x0000000075213000-memory.dmp

          Filesize

          8KB

        • memory/1268-79-0x0000000002280000-0x00000000022A9000-memory.dmp

          Filesize

          164KB

        • memory/1492-82-0x0000000000400000-0x0000000000428444-memory.dmp

          Filesize

          161KB