Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-10-2022 18:01
Static task
static1
Behavioral task
behavioral1
Sample
fea9e6588163a319883a3b4d9b1f48fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fea9e6588163a319883a3b4d9b1f48fe.exe
Resource
win10v2004-20220901-en
General
-
Target
fea9e6588163a319883a3b4d9b1f48fe.exe
-
Size
4.7MB
-
MD5
fea9e6588163a319883a3b4d9b1f48fe
-
SHA1
56365a251100676323840fa5dfdabaad99f2f772
-
SHA256
92a433340dd32cb379159432fbc26a6f2ca495ef97c31f7fd333913ced03d773
-
SHA512
1ff3265167ee61827fd19818da1bcf8f5abd97fa7cf4f601e7dcab7b19cb5fc14b0b21b7966ed174e5f055344fb97b54791be47e15a8a7642f853ea855d65cab
-
SSDEEP
24576:MztFdtnYQb6VOFv1bdLOqGmXL4pu2OqfNoROKiuHym1fkBonH6X7GUAUTiS0YZRT:
Malware Config
Extracted
bitrat
1.38
gh9st.mywire.org:5005
-
communication_password
803355ca422bf9b37bc523a750e21842
-
install_dir
svcsvc
-
install_file
svcsvc.exe
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fea9e6588163a319883a3b4d9b1f48fe.exefea9e6588163a319883a3b4d9b1f48fe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Fsaxd = "\"C:\\Users\\Admin\\AppData\\Roaming\\Fdqudm\\Fsaxd.exe\"" fea9e6588163a319883a3b4d9b1f48fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\svcsvc = "C:\\Users\\Admin\\AppData\\Local\\svcsvc\\svcsvc.exe" fea9e6588163a319883a3b4d9b1f48fe.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
fea9e6588163a319883a3b4d9b1f48fe.exepid process 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fea9e6588163a319883a3b4d9b1f48fe.exedescription pid process target process PID 1848 set thread context of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exefea9e6588163a319883a3b4d9b1f48fe.exepid process 856 powershell.exe 1848 fea9e6588163a319883a3b4d9b1f48fe.exe 1848 fea9e6588163a319883a3b4d9b1f48fe.exe -
Suspicious behavior: RenamesItself 16 IoCs
Processes:
fea9e6588163a319883a3b4d9b1f48fe.exepid process 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exefea9e6588163a319883a3b4d9b1f48fe.exefea9e6588163a319883a3b4d9b1f48fe.exedescription pid process Token: SeDebugPrivilege 856 powershell.exe Token: SeDebugPrivilege 1848 fea9e6588163a319883a3b4d9b1f48fe.exe Token: SeDebugPrivilege 528 fea9e6588163a319883a3b4d9b1f48fe.exe Token: SeShutdownPrivilege 528 fea9e6588163a319883a3b4d9b1f48fe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
fea9e6588163a319883a3b4d9b1f48fe.exepid process 528 fea9e6588163a319883a3b4d9b1f48fe.exe 528 fea9e6588163a319883a3b4d9b1f48fe.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
fea9e6588163a319883a3b4d9b1f48fe.exedescription pid process target process PID 1848 wrote to memory of 856 1848 fea9e6588163a319883a3b4d9b1f48fe.exe powershell.exe PID 1848 wrote to memory of 856 1848 fea9e6588163a319883a3b4d9b1f48fe.exe powershell.exe PID 1848 wrote to memory of 856 1848 fea9e6588163a319883a3b4d9b1f48fe.exe powershell.exe PID 1848 wrote to memory of 856 1848 fea9e6588163a319883a3b4d9b1f48fe.exe powershell.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe PID 1848 wrote to memory of 528 1848 fea9e6588163a319883a3b4d9b1f48fe.exe fea9e6588163a319883a3b4d9b1f48fe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fea9e6588163a319883a3b4d9b1f48fe.exe"C:\Users\Admin\AppData\Local\Temp\fea9e6588163a319883a3b4d9b1f48fe.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Users\Admin\AppData\Local\Temp\fea9e6588163a319883a3b4d9b1f48fe.exeC:\Users\Admin\AppData\Local\Temp\fea9e6588163a319883a3b4d9b1f48fe.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:528