Analysis
-
max time kernel
142s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe
Resource
win10v2004-20220901-en
General
-
Target
7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe
-
Size
144KB
-
MD5
6e0f9818bce264cc35ab4668c8cae6b0
-
SHA1
bae6c9905a27b4c03e3e1611bedcdb04dc1cae3f
-
SHA256
7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534
-
SHA512
acc3c99e1abe814322ab893958cda74591e00408535acd01eef326dcec7d47b001597f667f3a16a7f95ce1749f13d5d97b1569a33789c8273a45ba94d8c5c700
-
SSDEEP
768:Zr4pOx8e/aOVq413ixQGPL4vzZq2o9W7GsxBbPr:GpOx8eyOVD13i2GCq2iW7z
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0008000000005c51-54.dat aspack_v212_v242 behavioral1/files/0x0008000000005c51-55.dat aspack_v212_v242 behavioral1/files/0x0008000000005c51-57.dat aspack_v212_v242 behavioral1/files/0x0008000000005c51-59.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1776 EIhyxM.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe 2036 7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe EIhyxM.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe EIhyxM.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe EIhyxM.exe File opened for modification C:\Program Files\7-Zip\7zG.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe EIhyxM.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe EIhyxM.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe EIhyxM.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe EIhyxM.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe EIhyxM.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe EIhyxM.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE EIhyxM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE EIhyxM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE EIhyxM.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe EIhyxM.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5FF82FCB-66EC-4D84-9E60-60D03C1CDEBC}\chrome_installer.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe EIhyxM.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe EIhyxM.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe EIhyxM.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe EIhyxM.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe EIhyxM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe EIhyxM.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe EIhyxM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe 2036 7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1776 2036 7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe 27 PID 2036 wrote to memory of 1776 2036 7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe 27 PID 2036 wrote to memory of 1776 2036 7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe 27 PID 2036 wrote to memory of 1776 2036 7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe 27 PID 1776 wrote to memory of 360 1776 EIhyxM.exe 30 PID 1776 wrote to memory of 360 1776 EIhyxM.exe 30 PID 1776 wrote to memory of 360 1776 EIhyxM.exe 30 PID 1776 wrote to memory of 360 1776 EIhyxM.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe"C:\Users\Admin\AppData\Local\Temp\7468b3c64e4616e2a0a5c5c343a56e65b7d8ecf166b3aa3c4d189debe4d78534.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\EIhyxM.exeC:\Users\Admin\AppData\Local\Temp\EIhyxM.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5b523af7.bat" "3⤵PID:360
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5f20634ed0c830855588d7f2bb4d8b3bb
SHA1beb76ec3429e31e2fec5e159fd9fdee49c2467b4
SHA256dfe2adb7fa413539ce656820ae1e28121c206e5b7224cb3db27b8a8e4d84e3c8
SHA51242cb11095abcf40ebba6545905abaddee13fc242ba55783961459b300612a056180fce65ad59cabf93273b635ea5c0ea976033aec2bf02a86c4a67029c317051
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e