Analysis
-
max time kernel
139s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe
Resource
win10v2004-20220812-en
General
-
Target
97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe
-
Size
319KB
-
MD5
80720635ed7696ee1e62d23536fbbda0
-
SHA1
8143a14cf9149769b186fc8a215a8b1b19cc30de
-
SHA256
97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed
-
SHA512
ef7a857b121b1146ab3d195c3c9db68a563ee7d79953c99e6264dc6728ad847d1cf45af8c9a68e778f6b8aa4679e0cb92d5848248fed1d33896962814ea9b2a7
-
SSDEEP
6144:xWAovvpnnEtIyDzWAovvpnnEtIyDzWAovvpnnEtIyD7j1OCGhsC2x/:xW7R8IyDzW7R8IyDzW7R8IyDVOCGaCu/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 616 svghost.exe -
Loads dropped DLL 5 IoCs
pid Process 616 svghost.exe 616 svghost.exe 616 svghost.exe 616 svghost.exe 616 svghost.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svghost.exe File opened (read-only) \??\N: svghost.exe File opened (read-only) \??\S: svghost.exe File opened (read-only) \??\T: svghost.exe File opened (read-only) \??\Y: svghost.exe File opened (read-only) \??\Z: svghost.exe File opened (read-only) \??\A: svghost.exe File opened (read-only) \??\G: svghost.exe File opened (read-only) \??\L: svghost.exe File opened (read-only) \??\M: svghost.exe File opened (read-only) \??\V: svghost.exe File opened (read-only) \??\O: svghost.exe File opened (read-only) \??\R: svghost.exe File opened (read-only) \??\U: svghost.exe File opened (read-only) \??\E: svghost.exe File opened (read-only) \??\H: svghost.exe File opened (read-only) \??\I: svghost.exe File opened (read-only) \??\J: svghost.exe File opened (read-only) \??\K: svghost.exe File opened (read-only) \??\X: svghost.exe File opened (read-only) \??\B: svghost.exe File opened (read-only) \??\P: svghost.exe File opened (read-only) \??\Q: svghost.exe File opened (read-only) \??\W: svghost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\svghost.exe 97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe File created C:\Windows\svghost.exe 97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 616 1196 97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe 27 PID 1196 wrote to memory of 616 1196 97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe 27 PID 1196 wrote to memory of 616 1196 97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe 27 PID 1196 wrote to memory of 616 1196 97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe"C:\Users\Admin\AppData\Local\Temp\97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\svghost.exe"C:\Windows\svghost.exe" "C:\Users\Admin\AppData\Local\Temp\97fcf3a90458a165a67e214c8cb8f90f88f6ca0d09bbca9d07d1565b3bc4ffed.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5e93fb49a4e8b58a8e5a9dc232a6d4094
SHA1e88fda5ed1d0727cc9e02c3ad0c9def75a1295f8
SHA256388d33ff65d0aa5159935d1e6bb83b5253e159086bb2c393fb02428d25ab8082
SHA512b213b8fb4ff1f8e30ab654db5e1cb4aafbcd200d0a5f582b435a5a0b9f8fadea78f98be3313329e785e7f2ff4c7f1e81b20ca7e4600e50d7d5ebe307b52758bc
-
Filesize
84KB
MD5e93fb49a4e8b58a8e5a9dc232a6d4094
SHA1e88fda5ed1d0727cc9e02c3ad0c9def75a1295f8
SHA256388d33ff65d0aa5159935d1e6bb83b5253e159086bb2c393fb02428d25ab8082
SHA512b213b8fb4ff1f8e30ab654db5e1cb4aafbcd200d0a5f582b435a5a0b9f8fadea78f98be3313329e785e7f2ff4c7f1e81b20ca7e4600e50d7d5ebe307b52758bc
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
145KB
MD59d10f99a6712e28f8acd5641e3a7ea6b
SHA1835e982347db919a681ba12f3891f62152e50f0d
SHA25670964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc
SHA5122141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452
-
Filesize
1.0MB
MD54d92f518527353c0db88a70fddcfd390
SHA1c4baffc19e7d1f0e0ebf73bab86a491c1d152f98
SHA25697e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c
SHA51205a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452