Analysis
-
max time kernel
186s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 15:46
Static task
static1
Behavioral task
behavioral1
Sample
56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe
Resource
win10v2004-20220812-en
General
-
Target
56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe
-
Size
1.2MB
-
MD5
a18dcc398139154de6b694db84b46a20
-
SHA1
c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
-
SHA256
56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
-
SHA512
a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf
-
SSDEEP
24576:3tb20pkaCqT5TBWgNQ7aLoc2Zwkw2Id1gq3JA36A:0Vg5tQ7aLoc2FFId1gq3JG5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 936 67779.exe -
Loads dropped DLL 4 IoCs
pid Process 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 67779.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\WerFault = "C:\\Users\\Admin\\AppData\\Roaming\\67779.exe" 67779.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000d0000000054a8-55.dat autoit_exe behavioral1/files/0x000d0000000054a8-56.dat autoit_exe behavioral1/files/0x000d0000000054a8-57.dat autoit_exe behavioral1/files/0x000d0000000054a8-58.dat autoit_exe behavioral1/files/0x000d0000000054a8-60.dat autoit_exe behavioral1/files/0x000d0000000054a8-62.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 936 set thread context of 1104 936 67779.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\67779.exe:Zone.Identifier:$DATA 67779.exe File created C:\Users\Admin\AppData\Local\Temp\56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe:Zone.Identifier:$DATA 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe File created C:\Users\Admin\AppData\Roaming\67779.exe\:Zone.Identifier:$DATA 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1104 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1104 vbc.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 936 67779.exe 936 67779.exe 936 67779.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 936 67779.exe 936 67779.exe 936 67779.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1104 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 944 wrote to memory of 936 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 28 PID 944 wrote to memory of 936 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 28 PID 944 wrote to memory of 936 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 28 PID 944 wrote to memory of 936 944 56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe 28 PID 936 wrote to memory of 1104 936 67779.exe 29 PID 936 wrote to memory of 1104 936 67779.exe 29 PID 936 wrote to memory of 1104 936 67779.exe 29 PID 936 wrote to memory of 1104 936 67779.exe 29 PID 936 wrote to memory of 1104 936 67779.exe 29 PID 936 wrote to memory of 1104 936 67779.exe 29 PID 936 wrote to memory of 1104 936 67779.exe 29 PID 936 wrote to memory of 1104 936 67779.exe 29 PID 936 wrote to memory of 1104 936 67779.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe"C:\Users\Admin\AppData\Local\Temp\56a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\67779.exe"C:\Users\Admin\AppData\Roaming\67779.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1104
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD578ba668db1856f03ec5ad0390fc9a37f
SHA1d6ca40967c71c602827cb58fe07e2598280be564
SHA256e18bb1fb9dd27e14a6f672b5ce3c891b3a0ae50deb7b2a751c83817f6c1e6d4b
SHA512f25d8585680592aba09c9d878da1cde29a5119e769ddf782f943ecd26ce9732a031314ee7c1708b072a84c8e2c5b0ee6f4e94f9c4a9b9feda00a50be44bfaa3b
-
Filesize
1.2MB
MD5a18dcc398139154de6b694db84b46a20
SHA1c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
SHA25656a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
SHA512a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf
-
Filesize
1.2MB
MD5a18dcc398139154de6b694db84b46a20
SHA1c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
SHA25656a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
SHA512a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf
-
Filesize
1.2MB
MD5a18dcc398139154de6b694db84b46a20
SHA1c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
SHA25656a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
SHA512a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf
-
Filesize
1.2MB
MD5a18dcc398139154de6b694db84b46a20
SHA1c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
SHA25656a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
SHA512a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf
-
Filesize
1.2MB
MD5a18dcc398139154de6b694db84b46a20
SHA1c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
SHA25656a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
SHA512a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf
-
Filesize
1.2MB
MD5a18dcc398139154de6b694db84b46a20
SHA1c75bea6cad85a87e42c2b4e6e3e756bdc78e15b5
SHA25656a811fd6dffbdc6ea4fd497fbb2d3db0d47045deba2d235d6fe13c3cd73faea
SHA512a3617cdfc1573addecd06628ba210265203aa6213565cc6dc7b655fc186b9a24bffb20c9b600c5db5701375aaa7f1c6e67659c3f33e28ec837a0c10a6dab1fdf