Analysis
-
max time kernel
146s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 14:46
Static task
static1
Behavioral task
behavioral1
Sample
982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe
Resource
win10v2004-20220812-en
General
-
Target
982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe
-
Size
338KB
-
MD5
1a6e98a94b85f52007fd959f6b8bc110
-
SHA1
f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
-
SHA256
982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
-
SHA512
1c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26
-
SSDEEP
6144:i4V7nL2adqmpbSwQYpdE9nOYrGFigjeMpMwpmCezgpHreXFI8:i4V7nL2a9pR109n7rOiupu3zgt8a8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1444 svchost.exe 1448 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1732 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 1732 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Y: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1064 set thread context of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1444 set thread context of 1448 1444 svchost.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 1444 svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1064 wrote to memory of 1732 1064 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 27 PID 1732 wrote to memory of 1444 1732 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 28 PID 1732 wrote to memory of 1444 1732 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 28 PID 1732 wrote to memory of 1444 1732 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 28 PID 1732 wrote to memory of 1444 1732 982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe 28 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29 PID 1444 wrote to memory of 1448 1444 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe"C:\Users\Admin\AppData\Local\Temp\982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe"C:\Users\Admin\AppData\Local\Temp\982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1448
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD51a6e98a94b85f52007fd959f6b8bc110
SHA1f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
SHA256982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
SHA5121c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26
-
Filesize
338KB
MD51a6e98a94b85f52007fd959f6b8bc110
SHA1f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
SHA256982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
SHA5121c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26
-
Filesize
338KB
MD51a6e98a94b85f52007fd959f6b8bc110
SHA1f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
SHA256982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
SHA5121c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26
-
Filesize
338KB
MD51a6e98a94b85f52007fd959f6b8bc110
SHA1f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
SHA256982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
SHA5121c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26
-
Filesize
338KB
MD51a6e98a94b85f52007fd959f6b8bc110
SHA1f3bdccb0d1a136cef5af28d95b3b378fb8e204ed
SHA256982771c03b24a060549712a487f9d8f0d850fd35cc8a0578c79f1ba05c5793e8
SHA5121c2301bf20e4c730324aec545b2aab9eb6001ffd1da89ccf211a590eee5a51afc5dc82cd78709c71e7fddd53730dba4bb538478369058dcb58c4325b63c61d26