Analysis
-
max time kernel
95s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe
Resource
win10v2004-20220812-en
General
-
Target
91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe
-
Size
140KB
-
MD5
7f99ef612eef45f1595a2672ef7ab6a0
-
SHA1
8c2523517d94bc7262334727da1cc2d5340d9b7c
-
SHA256
91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c
-
SHA512
f3bd7c355d4d828f17ef53003d412929ddc917321e4d0cd34b5ffeb03d7a031364927439c89bace48fc0c8f47c48f646bab5fee05af0f5e5378549f2c3e64ee8
-
SSDEEP
3072:UPLNQiwQe7V6RHbNFwxHDya9CdrSOOYB3:USiYYRHMvWO0
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 904 svchost.exe 636 svchost.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WordPad.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WordPad.exe svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 1992 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 1992 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 904 svchost.exe 636 svchost.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 960 wrote to memory of 1992 960 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 27 PID 1992 wrote to memory of 904 1992 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 28 PID 1992 wrote to memory of 904 1992 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 28 PID 1992 wrote to memory of 904 1992 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 28 PID 1992 wrote to memory of 904 1992 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe 28 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 PID 904 wrote to memory of 636 904 svchost.exe 29 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe"C:\Users\Admin\AppData\Local\Temp\91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe"C:\Users\Admin\AppData\Local\Temp\91187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c.exe"2⤵
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1992 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Drops startup file
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:636
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD57f99ef612eef45f1595a2672ef7ab6a0
SHA18c2523517d94bc7262334727da1cc2d5340d9b7c
SHA25691187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c
SHA512f3bd7c355d4d828f17ef53003d412929ddc917321e4d0cd34b5ffeb03d7a031364927439c89bace48fc0c8f47c48f646bab5fee05af0f5e5378549f2c3e64ee8
-
Filesize
140KB
MD57f99ef612eef45f1595a2672ef7ab6a0
SHA18c2523517d94bc7262334727da1cc2d5340d9b7c
SHA25691187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c
SHA512f3bd7c355d4d828f17ef53003d412929ddc917321e4d0cd34b5ffeb03d7a031364927439c89bace48fc0c8f47c48f646bab5fee05af0f5e5378549f2c3e64ee8
-
Filesize
140KB
MD57f99ef612eef45f1595a2672ef7ab6a0
SHA18c2523517d94bc7262334727da1cc2d5340d9b7c
SHA25691187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c
SHA512f3bd7c355d4d828f17ef53003d412929ddc917321e4d0cd34b5ffeb03d7a031364927439c89bace48fc0c8f47c48f646bab5fee05af0f5e5378549f2c3e64ee8
-
Filesize
140KB
MD57f99ef612eef45f1595a2672ef7ab6a0
SHA18c2523517d94bc7262334727da1cc2d5340d9b7c
SHA25691187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c
SHA512f3bd7c355d4d828f17ef53003d412929ddc917321e4d0cd34b5ffeb03d7a031364927439c89bace48fc0c8f47c48f646bab5fee05af0f5e5378549f2c3e64ee8
-
Filesize
140KB
MD57f99ef612eef45f1595a2672ef7ab6a0
SHA18c2523517d94bc7262334727da1cc2d5340d9b7c
SHA25691187aadf4056777bfdfb499b8e3b5ef3b35c6d5579e5a17220115ef1b15fc2c
SHA512f3bd7c355d4d828f17ef53003d412929ddc917321e4d0cd34b5ffeb03d7a031364927439c89bace48fc0c8f47c48f646bab5fee05af0f5e5378549f2c3e64ee8