Analysis

  • max time kernel
    144s
  • max time network
    197s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/10/2022, 14:15

General

  • Target

    a40c09f512bb32a22f20793acb26145c8c23f35feb1dd469028c716297b44962.exe

  • Size

    3.8MB

  • MD5

    0cc0034904eca2f881b61885c5715415

  • SHA1

    8934a9e2e87a15c472549466650301126f4dcae1

  • SHA256

    a40c09f512bb32a22f20793acb26145c8c23f35feb1dd469028c716297b44962

  • SHA512

    09a76f05819d5d5d891f77f9730e33e592301e01f46cb6cf6097a9a0357de91b83e920c2a2b7fa7c5ed7467ff740743b4cb29af43b339d518fa9475e661258d4

  • SSDEEP

    98304:V1CGfmFxqzj9P9B4bM3cwQQKk7D65Pq9zKfD6UqE5/u/aZhmOGXltvEcni:NfPlPUI3cRkH65izkuyGVtMKi

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Checks for any installed AV software in registry 1 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 42 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 18 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a40c09f512bb32a22f20793acb26145c8c23f35feb1dd469028c716297b44962.exe
    "C:\Users\Admin\AppData\Local\Temp\a40c09f512bb32a22f20793acb26145c8c23f35feb1dd469028c716297b44962.exe"
    1⤵
    • Loads dropped DLL
    • Checks for any installed AV software in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Users\Admin\AppData\Local\Temp\vdfyl2hg.c3u.exe
      "C:\Users\Admin\AppData\Local\Temp\vdfyl2hg.c3u.exe" -i * -accept -silent -p pubid EF -p templateid 60db44bc4852f33a3e67f8c3 -p source lvsppi
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4988
      • C:\Windows\System32\sc.exe
        C:\Windows\System32\sc.exe create EsgShKernel start= demand binPath= "\"C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe\"" DisplayName= "SpyHunter 5 Kernel"
        3⤵
        • Launches sc.exe
        PID:3164
      • C:\Windows\System32\sc.exe
        C:\Windows\System32\sc.exe description EsgShKernel "SpyHunter 5 Kernel"
        3⤵
        • Launches sc.exe
        PID:4812
      • C:\Windows\System32\sc.exe
        C:\Windows\System32\sc.exe create ShMonitor start= demand binPath= "\"C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe\"" DisplayName= "SpyHunter 5 Kernel Monitor"
        3⤵
        • Launches sc.exe
        PID:740
      • C:\Windows\System32\sc.exe
        C:\Windows\System32\sc.exe description ShMonitor "SpyHunter 5 Kernel Monitor"
        3⤵
        • Launches sc.exe
        PID:1432
      • C:\Windows\System32\sc.exe
        C:\Windows\System32\sc.exe config ShMonitor start= auto
        3⤵
        • Launches sc.exe
        PID:4592
      • C:\Windows\System32\sc.exe
        C:\Windows\System32\sc.exe config EsgShKernel start= auto
        3⤵
        • Launches sc.exe
        PID:428
      • C:\Windows\System32\regsvr32.exe
        C:\Windows\System32\regsvr32.exe /s "C:\Program Files\EnigmaSoft\SpyHunter\ShShellExt.dll"
        3⤵
        • Registers COM server for autorun
        • Loads dropped DLL
        • Modifies registry class
        PID:216
      • C:\Users\Admin\AppData\Local\Temp\EsgInstallerDelay__0.exe
        C:\Users\Admin\AppData\Local\Temp\EsgInstallerDelay__0.exe -exec OpfXySN2sIJfRn7kaByo3fAgnhU5bFC+1YK5gktB214= -args MHLPvv2eVF5BDDAj57kaKhLlRzVl3TCPBu81sCtfDvA= -wait 300
        3⤵
        • Executes dropped EXE
        PID:2316
      • C:\Users\Admin\AppData\Local\Temp\EsgInstallerDelay__1.exe
        C:\Users\Admin\AppData\Local\Temp\EsgInstallerDelay__1.exe -exec OpfXySN2sIJfRn7kaByo3fAgnhU5bFC+1YK5gktB214= -args hOGTiE/QHFPjrWqL1njGygtJtFEVLgswO/2BlkHQX4U= -wait 300
        3⤵
        • Executes dropped EXE
        PID:508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\EnigmaSoft\SpyHunter\ShShellExt.dll

    Filesize

    836KB

    MD5

    063e0478e4b486727b461901126c15da

    SHA1

    e552135017a177ace07dc5543713ac6aa1b01ac1

    SHA256

    1c8cbc1f0b127ff218f2bde1f1d21991c384f6be4524cd926f1b7061150929b6

    SHA512

    1786efc1dca4c7c7307ffa9d70847606a1d5561fd7514cef8fe2c8851e3a8bf2ee4a71e9193514fe15708e55a63ce2781406d62fbe760bd2f8ebd90a143a397a

  • C:\Users\Admin\AppData\Local\Temp\EsgInstallerDelay__0.exe

    Filesize

    360KB

    MD5

    edce372de488aa221da7db7544c09b3e

    SHA1

    e684be09c22e93b12af9f78508e5422b83cbe0fc

    SHA256

    dbc0b0afeae1e33f3f8fa2384bbbfd2f787aca1c75bf2e5372812b3da33a7efe

    SHA512

    89a21c8c4d4963b02e36cd887b071b866cebafc1f8e04aab6cf043746aadb37799644e41fa3b1ddb1e297593b0035693e151b9b5ecf95041e0796bf47174e6b1

  • C:\Users\Admin\AppData\Local\Temp\EsgInstallerDelay__1.exe

    Filesize

    360KB

    MD5

    edce372de488aa221da7db7544c09b3e

    SHA1

    e684be09c22e93b12af9f78508e5422b83cbe0fc

    SHA256

    dbc0b0afeae1e33f3f8fa2384bbbfd2f787aca1c75bf2e5372812b3da33a7efe

    SHA512

    89a21c8c4d4963b02e36cd887b071b866cebafc1f8e04aab6cf043746aadb37799644e41fa3b1ddb1e297593b0035693e151b9b5ecf95041e0796bf47174e6b1

  • C:\Users\Admin\AppData\Local\Temp\vdfyl2hg.c3u.exe

    Filesize

    6.5MB

    MD5

    e6641ee42850560ca64b0d25627e7a4e

    SHA1

    ee69ae31882d73a8ce45bdc4126c3444a67b67ae

    SHA256

    6032a910115f270683c9aa0044b12dcad498409a9d1e71d3aa8c05c6fd4e7670

    SHA512

    8acab949a20f5cfd17e3d897dfcb31ed0f2954ea7cb0f0978066f9a56e5903b39d50200f8d3e2dabad25b495d0ed941c98fc2e14177bda655dd89c9460047f33

  • C:\Users\Admin\AppData\Local\Temp\vdfyl2hg.c3u.exe

    Filesize

    6.5MB

    MD5

    e6641ee42850560ca64b0d25627e7a4e

    SHA1

    ee69ae31882d73a8ce45bdc4126c3444a67b67ae

    SHA256

    6032a910115f270683c9aa0044b12dcad498409a9d1e71d3aa8c05c6fd4e7670

    SHA512

    8acab949a20f5cfd17e3d897dfcb31ed0f2954ea7cb0f0978066f9a56e5903b39d50200f8d3e2dabad25b495d0ed941c98fc2e14177bda655dd89c9460047f33

  • \Program Files\EnigmaSoft\SpyHunter\ShShellExt.dll

    Filesize

    836KB

    MD5

    063e0478e4b486727b461901126c15da

    SHA1

    e552135017a177ace07dc5543713ac6aa1b01ac1

    SHA256

    1c8cbc1f0b127ff218f2bde1f1d21991c384f6be4524cd926f1b7061150929b6

    SHA512

    1786efc1dca4c7c7307ffa9d70847606a1d5561fd7514cef8fe2c8851e3a8bf2ee4a71e9193514fe15708e55a63ce2781406d62fbe760bd2f8ebd90a143a397a

  • \Users\Admin\AppData\Local\Temp\b0798393d0554967284c5503d2e1a4da\ServiceHide.Net.dll

    Filesize

    102KB

    MD5

    657db9c5ee9729f548008dc840bda659

    SHA1

    847b319acb03f37fca5753aaa3f36eeba168561a

    SHA256

    0d45a75a4571e380fe51bc8ceba4c99a23339c8e39f15487eeaf6f0a25d4ace2

    SHA512

    7c49e05c718f253be689a18e57c93dd66415531f6cde0194f20762aaa7ac4533ee5461c924b2bd576fd3f3f3cd1025fad4efb64e7ab014b751f50c8d05ba369b

  • \Users\Admin\AppData\Local\Temp\b0798393d0554967284c5503d2e1a4da\ServiceHide.Net.dll

    Filesize

    102KB

    MD5

    657db9c5ee9729f548008dc840bda659

    SHA1

    847b319acb03f37fca5753aaa3f36eeba168561a

    SHA256

    0d45a75a4571e380fe51bc8ceba4c99a23339c8e39f15487eeaf6f0a25d4ace2

    SHA512

    7c49e05c718f253be689a18e57c93dd66415531f6cde0194f20762aaa7ac4533ee5461c924b2bd576fd3f3f3cd1025fad4efb64e7ab014b751f50c8d05ba369b

  • \Users\Admin\AppData\Local\Temp\b0798393d0554967284c5503d2e1a4da\ServiceHide.Net.dll

    Filesize

    102KB

    MD5

    657db9c5ee9729f548008dc840bda659

    SHA1

    847b319acb03f37fca5753aaa3f36eeba168561a

    SHA256

    0d45a75a4571e380fe51bc8ceba4c99a23339c8e39f15487eeaf6f0a25d4ace2

    SHA512

    7c49e05c718f253be689a18e57c93dd66415531f6cde0194f20762aaa7ac4533ee5461c924b2bd576fd3f3f3cd1025fad4efb64e7ab014b751f50c8d05ba369b

  • \Users\Admin\AppData\Local\Temp\b0798393d0554967284c5503d2e1a4da\ServiceHide.dll

    Filesize

    150KB

    MD5

    09abd0294a86d5871ad9fc60ce3eedc9

    SHA1

    353aaaa71980d97d9cc2cc19b557fce3dd9ab1ee

    SHA256

    448126e9edf267f6b42b6e7b318c9c1622422ec1625688add58472717a392d14

    SHA512

    97828ad9d67229d2454ec69589dda2a2e11e6754587859c47ec197f279f8e6dda4c436fff8d2e0c8f71dd0266ff6db5e459699db38923a7d2ea1fb136ac4141d

  • \Users\Admin\AppData\Local\Temp\b0798393d0554967284c5503d2e1a4da\msvcp140.dll

    Filesize

    426KB

    MD5

    8ff1898897f3f4391803c7253366a87b

    SHA1

    9bdbeed8f75a892b6b630ef9e634667f4c620fa0

    SHA256

    51398691feef7ae0a876b523aec47c4a06d9a1ee62f1a0aee27de6d6191c68ad

    SHA512

    cb071ad55beaa541b5baf1f7d5e145f2c26fbee53e535e8c31b8f2b8df4bf7723f7bef214b670b2c3de57a4a75711dd204a940a2158939ad72f551e32da7ab03

  • \Users\Admin\AppData\Local\Temp\b0798393d0554967284c5503d2e1a4da\sciter32.dll

    Filesize

    5.6MB

    MD5

    b431083586e39d018e19880ad1a5ce8f

    SHA1

    3bbf957ab534d845d485a8698accc0a40b63cedd

    SHA256

    b525fdcc32c5a359a7f5738a30eff0c6390734d8a2c987c62e14c619f99d406b

    SHA512

    7805a3464fcc3ac4ea1258e2412180c52f2af40a79b540348486c830a20c2bbed337bbf5f4a8926b3ef98c63c87747014f5b43c35f7ec4e7a3693b9dbd0ae67b

  • \Users\Admin\AppData\Local\Temp\b0798393d0554967284c5503d2e1a4da\vcruntime140.dll

    Filesize

    74KB

    MD5

    1a84957b6e681fca057160cd04e26b27

    SHA1

    8d7e4c98d1ec858db26a3540baaaa9bbf96b5bfe

    SHA256

    9faeaa45e8cc986af56f28350b38238b03c01c355e9564b849604b8d690919c5

    SHA512

    5f54c9e87f2510c56f3cf2ceeb5b5ad7711abd9f85a1ff84e74dd82d15181505e7e5428eae6ff823f1190964eb0a82a569273a4562ec4131cecfa00a9d0d02aa

  • memory/3828-141-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-177-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-138-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-139-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-140-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-116-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-142-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-143-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-144-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-145-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-146-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-147-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-148-0x0000000000480000-0x0000000000852000-memory.dmp

    Filesize

    3.8MB

  • memory/3828-149-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-150-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-151-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-152-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-153-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-154-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-155-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-156-0x00000000052C0000-0x00000000056E6000-memory.dmp

    Filesize

    4.1MB

  • memory/3828-136-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-158-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-160-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-163-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-162-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-161-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-159-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-164-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-165-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-166-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-167-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-169-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-168-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-170-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-171-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-172-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-173-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-174-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-137-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-175-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-176-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-179-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-135-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-181-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-184-0x0000000001210000-0x0000000001238000-memory.dmp

    Filesize

    160KB

  • memory/3828-185-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-186-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-132-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-183-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-134-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-188-0x0000000005240000-0x000000000526C000-memory.dmp

    Filesize

    176KB

  • memory/3828-192-0x0000000005270000-0x000000000528D000-memory.dmp

    Filesize

    116KB

  • memory/3828-133-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-131-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-130-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-199-0x00000000073A0000-0x00000000073B2000-memory.dmp

    Filesize

    72KB

  • memory/3828-223-0x0000000007BF0000-0x0000000007C7C000-memory.dmp

    Filesize

    560KB

  • memory/3828-224-0x0000000007CE0000-0x0000000007D02000-memory.dmp

    Filesize

    136KB

  • memory/3828-226-0x0000000007D10000-0x0000000008060000-memory.dmp

    Filesize

    3.3MB

  • memory/3828-228-0x0000000005D10000-0x000000000620E000-memory.dmp

    Filesize

    5.0MB

  • memory/3828-238-0x0000000005A80000-0x0000000005B12000-memory.dmp

    Filesize

    584KB

  • memory/3828-245-0x0000000005CE0000-0x0000000005D0E000-memory.dmp

    Filesize

    184KB

  • memory/3828-261-0x0000000006400000-0x000000000640A000-memory.dmp

    Filesize

    40KB

  • memory/3828-117-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-129-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-128-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-127-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-118-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-126-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-125-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-119-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-124-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-123-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-122-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-121-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3828-120-0x0000000077440000-0x00000000775CE000-memory.dmp

    Filesize

    1.6MB