Analysis
-
max time kernel
151s -
max time network
85s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 10:01
Static task
static1
Behavioral task
behavioral1
Sample
27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe
Resource
win10v2004-20220812-en
General
-
Target
27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe
-
Size
112KB
-
MD5
80677edda94f587779997e7d3b47365e
-
SHA1
a774b737c1981d36171464371fd43703b3661392
-
SHA256
27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa
-
SHA512
512ba6e18eff909b93729c933ccb6860290b27f7a4b29b3024837caa6cee4bbe0531b78d31699d0c6b236882fe0d4988fc8bd471eb26396f788faccc798858c6
-
SSDEEP
1536:+T4q/5kwYvNcWNl4MfCCpYwlgNPQ6fF+K0g1yBubzFkh34SGDLHI:HlGlog1yBub5DfI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1032 vschost.exe 684 vschost.exe -
resource yara_rule behavioral1/memory/1656-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1656-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1656-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1656-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1656-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1656-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1656-111-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/684-114-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/684-118-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\vschost = "C:\\Users\\Admin\\AppData\\Roaming\\vschost\\vschost.exe" reg.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf InstallUtil.exe File created C:\autorun.inf InstallUtil.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1008 set thread context of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1032 set thread context of 684 1032 vschost.exe 33 PID 1032 set thread context of 1932 1032 vschost.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe Token: SeDebugPrivilege 684 vschost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 1032 vschost.exe 684 vschost.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1008 wrote to memory of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1008 wrote to memory of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1008 wrote to memory of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1008 wrote to memory of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1008 wrote to memory of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1008 wrote to memory of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1008 wrote to memory of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1008 wrote to memory of 1656 1008 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 28 PID 1656 wrote to memory of 1596 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 29 PID 1656 wrote to memory of 1596 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 29 PID 1656 wrote to memory of 1596 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 29 PID 1656 wrote to memory of 1596 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 29 PID 1596 wrote to memory of 912 1596 cmd.exe 31 PID 1596 wrote to memory of 912 1596 cmd.exe 31 PID 1596 wrote to memory of 912 1596 cmd.exe 31 PID 1596 wrote to memory of 912 1596 cmd.exe 31 PID 1656 wrote to memory of 1032 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 32 PID 1656 wrote to memory of 1032 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 32 PID 1656 wrote to memory of 1032 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 32 PID 1656 wrote to memory of 1032 1656 27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe 32 PID 1032 wrote to memory of 684 1032 vschost.exe 33 PID 1032 wrote to memory of 684 1032 vschost.exe 33 PID 1032 wrote to memory of 684 1032 vschost.exe 33 PID 1032 wrote to memory of 684 1032 vschost.exe 33 PID 1032 wrote to memory of 684 1032 vschost.exe 33 PID 1032 wrote to memory of 684 1032 vschost.exe 33 PID 1032 wrote to memory of 684 1032 vschost.exe 33 PID 1032 wrote to memory of 684 1032 vschost.exe 33 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34 PID 1032 wrote to memory of 1932 1032 vschost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe"C:\Users\Admin\AppData\Local\Temp\27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe"C:\Users\Admin\AppData\Local\Temp\27e8196401b04c0d1845152be0877094e57397f509bed8046b36e1b1029820aa.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ALBVT.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "vschost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\vschost\vschost.exe" /f4⤵
- Adds Run key to start application
PID:912
-
-
-
C:\Users\Admin\AppData\Roaming\vschost\vschost.exe"C:\Users\Admin\AppData\Roaming\vschost\vschost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Roaming\vschost\vschost.exe"C:\Users\Admin\AppData\Roaming\vschost\vschost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:684
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"C:\Windows\\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe"4⤵
- Drops autorun.inf file
PID:1932
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD570ba506fca66d0bb4aadeb32cc20baa1
SHA1adf1deced9481c48f5ec3c4bcdd7c92ab6b3477a
SHA25685307f37bc656a402cbd1bd41927754b4b33190de5c04ad07a4e915f6046e9dc
SHA512da5a08fb9b78511c7fc73985ba31a11df389b171b57ba878ec33caf156d720487904be869d5baadea2a757eebf052592904ecb99897cf738c91a4e1d377f940f
-
Filesize
112KB
MD5eda4f5cd770ef33af5188f7a82f118de
SHA1a31915e5298b6f101206b5abce61102abc0a48f9
SHA2569f270d8d0579d5040eeacfdadc041404a3826d6bf6c1483a1271336a04f8f33a
SHA512c8ec697f6911c8bae2c9e2f7dc3f5060f3391f4d2fa4d473ede4c1a368291e1c312002f11a48c99f9c95c6a62728687dacea8cafa600e5d67b32e971cee90844
-
Filesize
112KB
MD5eda4f5cd770ef33af5188f7a82f118de
SHA1a31915e5298b6f101206b5abce61102abc0a48f9
SHA2569f270d8d0579d5040eeacfdadc041404a3826d6bf6c1483a1271336a04f8f33a
SHA512c8ec697f6911c8bae2c9e2f7dc3f5060f3391f4d2fa4d473ede4c1a368291e1c312002f11a48c99f9c95c6a62728687dacea8cafa600e5d67b32e971cee90844
-
Filesize
112KB
MD5eda4f5cd770ef33af5188f7a82f118de
SHA1a31915e5298b6f101206b5abce61102abc0a48f9
SHA2569f270d8d0579d5040eeacfdadc041404a3826d6bf6c1483a1271336a04f8f33a
SHA512c8ec697f6911c8bae2c9e2f7dc3f5060f3391f4d2fa4d473ede4c1a368291e1c312002f11a48c99f9c95c6a62728687dacea8cafa600e5d67b32e971cee90844
-
Filesize
112KB
MD5eda4f5cd770ef33af5188f7a82f118de
SHA1a31915e5298b6f101206b5abce61102abc0a48f9
SHA2569f270d8d0579d5040eeacfdadc041404a3826d6bf6c1483a1271336a04f8f33a
SHA512c8ec697f6911c8bae2c9e2f7dc3f5060f3391f4d2fa4d473ede4c1a368291e1c312002f11a48c99f9c95c6a62728687dacea8cafa600e5d67b32e971cee90844
-
Filesize
112KB
MD5eda4f5cd770ef33af5188f7a82f118de
SHA1a31915e5298b6f101206b5abce61102abc0a48f9
SHA2569f270d8d0579d5040eeacfdadc041404a3826d6bf6c1483a1271336a04f8f33a
SHA512c8ec697f6911c8bae2c9e2f7dc3f5060f3391f4d2fa4d473ede4c1a368291e1c312002f11a48c99f9c95c6a62728687dacea8cafa600e5d67b32e971cee90844
-
Filesize
112KB
MD5eda4f5cd770ef33af5188f7a82f118de
SHA1a31915e5298b6f101206b5abce61102abc0a48f9
SHA2569f270d8d0579d5040eeacfdadc041404a3826d6bf6c1483a1271336a04f8f33a
SHA512c8ec697f6911c8bae2c9e2f7dc3f5060f3391f4d2fa4d473ede4c1a368291e1c312002f11a48c99f9c95c6a62728687dacea8cafa600e5d67b32e971cee90844
-
Filesize
112KB
MD5eda4f5cd770ef33af5188f7a82f118de
SHA1a31915e5298b6f101206b5abce61102abc0a48f9
SHA2569f270d8d0579d5040eeacfdadc041404a3826d6bf6c1483a1271336a04f8f33a
SHA512c8ec697f6911c8bae2c9e2f7dc3f5060f3391f4d2fa4d473ede4c1a368291e1c312002f11a48c99f9c95c6a62728687dacea8cafa600e5d67b32e971cee90844
-
Filesize
112KB
MD5eda4f5cd770ef33af5188f7a82f118de
SHA1a31915e5298b6f101206b5abce61102abc0a48f9
SHA2569f270d8d0579d5040eeacfdadc041404a3826d6bf6c1483a1271336a04f8f33a
SHA512c8ec697f6911c8bae2c9e2f7dc3f5060f3391f4d2fa4d473ede4c1a368291e1c312002f11a48c99f9c95c6a62728687dacea8cafa600e5d67b32e971cee90844