Analysis
-
max time kernel
151s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 14:26
Static task
static1
Behavioral task
behavioral1
Sample
3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe
Resource
win10v2004-20220812-en
General
-
Target
3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe
-
Size
1.8MB
-
MD5
82629e3fbcaec576d07f8ef9d1640064
-
SHA1
08a43edd3f8abd89931b955d4bb88a02eef525d7
-
SHA256
3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f
-
SHA512
3e96d49d364f520fa224341d1619092569d60341e1d3d3753766c0a3b121588fe665f5f242cec8f63273c88d661fdce55772f51a1635f4a2222b1e2304a23c2b
-
SSDEEP
49152:LJZoQrbTFZY1iayaESazeshkBhKrLjXnQMk:LtrbTA1maRazDhDrXnQZ
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1724-72-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-75-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-76-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-79-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/1724-80-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/856-87-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/856-90-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/856-93-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/856-97-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/856-99-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/856-100-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/856-101-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1724-108-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1352 set thread context of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 set thread context of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1936 set thread context of 856 1936 vbc.exe 33 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\pavk.bin vbc.exe File opened for modification C:\Windows\ProcessHacker.exe vbc.exe File opened for modification C:\Windows\kprocesshacker.sys vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 856 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe 1724 vbc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1724 vbc.exe 1936 vbc.exe 856 vbc.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1352 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 26 PID 1388 wrote to memory of 1352 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 26 PID 1388 wrote to memory of 1352 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 26 PID 1388 wrote to memory of 1352 1388 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 26 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1936 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 27 PID 1352 wrote to memory of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1352 wrote to memory of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1352 wrote to memory of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1352 wrote to memory of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1352 wrote to memory of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1352 wrote to memory of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1352 wrote to memory of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1352 wrote to memory of 1724 1352 3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe 28 PID 1724 wrote to memory of 1844 1724 vbc.exe 30 PID 1724 wrote to memory of 1844 1724 vbc.exe 30 PID 1724 wrote to memory of 1844 1724 vbc.exe 30 PID 1724 wrote to memory of 1844 1724 vbc.exe 30 PID 1936 wrote to memory of 856 1936 vbc.exe 33 PID 1936 wrote to memory of 856 1936 vbc.exe 33 PID 1936 wrote to memory of 856 1936 vbc.exe 33 PID 1936 wrote to memory of 856 1936 vbc.exe 33 PID 1936 wrote to memory of 856 1936 vbc.exe 33 PID 1936 wrote to memory of 856 1936 vbc.exe 33 PID 1936 wrote to memory of 856 1936 vbc.exe 33 PID 1936 wrote to memory of 856 1936 vbc.exe 33 PID 1724 wrote to memory of 1588 1724 vbc.exe 35 PID 1724 wrote to memory of 1588 1724 vbc.exe 35 PID 1724 wrote to memory of 1588 1724 vbc.exe 35 PID 1724 wrote to memory of 1588 1724 vbc.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe"C:\Users\Admin\AppData\Local\Temp\3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe"C:\Users\Admin\AppData\Local\Temp\3def2892211bc62ad4d1c268d2c76fa509d9cf85be2ea30342a6c9c2b288106f.exe" /AutoIt3ExecuteScript C:\Users\Admin\AppData\Local\Temp\FPsLfqcVX2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:856
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c del /q /f %temp%\*.lnk4⤵PID:1844
-
-
C:\Windows\SysWOW64\cmd.execmd /c start %temp%\xkNoOpSFd.exe4⤵PID:1588
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
834KB
MD5f35bfbba1d9a8a51ed27d3ffd24ae5bd
SHA139d82a7599bdb60d3b7f10cf81e3ddfeba80de31
SHA2565700b1983a2f5acd3013f28ec17894bb77d1994eea11dd4f5013ffb05481753a
SHA51205d6fb6ff662ae12844307eaa1496806e123411793a5568314c4f0f34361531e9b6b3b2678d6304c2d7de0be57fbc35a4828c770d925e95df4e6feccb4be6781
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD55fae023d0f4d9d94bcdbf6b5581a71ca
SHA1b6569e50b87b53c912430e8fe1dc1eda4192053e
SHA2561ff222637a9ef5c034bba5747b119bba0b7635aaf308832d2410d83b89f07ea2
SHA51297718df3e5f51d20966e4682bcd3ec29b43deafa912b46977197d51e55a1a34431f601462d658e58f5b6057e6708315b38f3a7432494ba8b0dbac31471b90b1c