Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 15:23
Static task
static1
Behavioral task
behavioral1
Sample
e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe
Resource
win10v2004-20220812-en
General
-
Target
e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe
-
Size
634KB
-
MD5
76a21d13dc46b8d41e0cbb57f21d5ac0
-
SHA1
cd4b721be961b58cc2fa524fa28416192b103acd
-
SHA256
e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2
-
SHA512
4c7d92a4d06db8316f31f2b1990f67cc3ffaf97c2957432a525cb52144ce9e2668c0201a75b024b61ce2386409dec04a485892928931ef53bd21e383c6d99f05
-
SSDEEP
6144:STv4sIND/AB4jYWoyGN2Ik5AfPjFWFNAy/7+dOYG+/WSZU6bewhrsRKcSTCn6:8ABhABEXotkI0A8AyzKOclfs3STCn
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe scvhost.exe" e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\scvhost.exe" e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\l: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\n: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\v: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\x: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\a: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\h: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\p: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\s: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\w: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\g: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\j: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\k: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\o: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\r: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\t: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\z: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\b: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\i: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\m: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\q: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\u: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\y: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened (read-only) \??\f: e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\scvhost.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File created C:\Windows\SysWOW64\blastclnnn.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\SysWOW64\blastclnnn.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\SysWOW64\autorun.ini e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File created C:\Windows\SysWOW64\setting.ini e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\SysWOW64\setting.ini e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\hinhem.scr e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File created C:\Windows\scvhost.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe File opened for modification C:\Windows\scvhost.exe e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe Token: SeIncBasePriorityPrivilege 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2264 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 82 PID 1752 wrote to memory of 2264 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 82 PID 1752 wrote to memory of 2264 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 82 PID 2264 wrote to memory of 4464 2264 cmd.exe 84 PID 2264 wrote to memory of 4464 2264 cmd.exe 84 PID 2264 wrote to memory of 4464 2264 cmd.exe 84 PID 1752 wrote to memory of 2160 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 85 PID 1752 wrote to memory of 2160 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 85 PID 1752 wrote to memory of 2160 1752 e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe 85 PID 2160 wrote to memory of 4836 2160 cmd.exe 87 PID 2160 wrote to memory of 4836 2160 cmd.exe 87 PID 2160 wrote to memory of 4836 2160 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe"C:\Users\Admin\AppData\Local\Temp\e741177a42bef4b9ba035b1a8bdc1a45bd5ba43fe468e3f6b663b48b0e740cd2.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe3⤵PID:4836
-
-