Analysis
-
max time kernel
149s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 14:26
Static task
static1
Behavioral task
behavioral1
Sample
a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe
Resource
win10v2004-20220812-en
General
-
Target
a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe
-
Size
1.3MB
-
MD5
f1e9a877303afbec6c317a32f981b339
-
SHA1
f62540b839006e032818d06d81e22657438b383d
-
SHA256
a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d
-
SHA512
b961e9b4a94ed66c7d9bb7df1a6eb55c065c0dfad66592b33b257ea93ccc3e4a025b76a5f809d0aba1078d5ba7b7bfd944e0ea32351d82708f76c0a46a4e3fb8
-
SSDEEP
24576:8JeyIwgF4TuBFGF9KGexdWbYBR0ia6NtF4elptFCFA1jlEwziNY7:6dIwgFbvGFaLWbPiheel9maewAe
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 896 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd 1196 TeamViewer_.exe 1748 SERVICEMGR.EXE 1264 TeamViewer.exe -
Loads dropped DLL 13 IoCs
pid Process 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 896 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 1196 TeamViewer_.exe 1196 TeamViewer_.exe 1196 TeamViewer_.exe 1196 TeamViewer_.exe 1196 TeamViewer_.exe 1196 TeamViewer_.exe 1196 TeamViewer_.exe 1196 TeamViewer_.exe 1264 TeamViewer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "C:\\Windows\\system32\\SERVICEMGR.EXE" SERVICEMGR.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "C:\\Windows\\system32\\SERVICEMGR.EXE" a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SERVICEMGR.EXE a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\QS\SAS.exe TeamViewer.exe File opened for modification C:\Program Files (x86)\QS\SAS.exe TeamViewer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 12 IoCs
resource yara_rule behavioral1/files/0x00090000000122ee-56.dat nsis_installer_1 behavioral1/files/0x00090000000122ee-56.dat nsis_installer_2 behavioral1/files/0x00090000000122ee-58.dat nsis_installer_1 behavioral1/files/0x00090000000122ee-58.dat nsis_installer_2 behavioral1/files/0x00090000000122ee-60.dat nsis_installer_1 behavioral1/files/0x00090000000122ee-60.dat nsis_installer_2 behavioral1/files/0x00080000000122f1-61.dat nsis_installer_1 behavioral1/files/0x00080000000122f1-61.dat nsis_installer_2 behavioral1/files/0x00080000000122f1-63.dat nsis_installer_1 behavioral1/files/0x00080000000122f1-63.dat nsis_installer_2 behavioral1/files/0x00080000000122f1-70.dat nsis_installer_1 behavioral1/files/0x00080000000122f1-70.dat nsis_installer_2 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 1748 SERVICEMGR.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1932 wrote to memory of 896 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 28 PID 1932 wrote to memory of 896 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 28 PID 1932 wrote to memory of 896 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 28 PID 1932 wrote to memory of 896 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 28 PID 896 wrote to memory of 1196 896 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd 29 PID 896 wrote to memory of 1196 896 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd 29 PID 896 wrote to memory of 1196 896 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd 29 PID 896 wrote to memory of 1196 896 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd 29 PID 1932 wrote to memory of 1748 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 30 PID 1932 wrote to memory of 1748 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 30 PID 1932 wrote to memory of 1748 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 30 PID 1932 wrote to memory of 1748 1932 a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe 30 PID 1196 wrote to memory of 1264 1196 TeamViewer_.exe 31 PID 1196 wrote to memory of 1264 1196 TeamViewer_.exe 31 PID 1196 wrote to memory of 1264 1196 TeamViewer_.exe 31 PID 1196 wrote to memory of 1264 1196 TeamViewer_.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe"C:\Users\Admin\AppData\Local\Temp\a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwdC:\Users\Admin\AppData\Local\Temp\a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\temp\TeamViewer3\TeamViewer_.exe"C:\Users\Admin\temp\TeamViewer3\TeamViewer_.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\temp\TeamViewer3\TeamViewer.exe"C:\Users\Admin\temp\TeamViewer3\TeamViewer.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:1264
-
-
-
-
C:\Windows\SysWOW64\SERVICEMGR.EXEC:\Windows\system32\SERVICEMGR.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd
Filesize1.2MB
MD50fbf9ce79e1cb0b6f70d7c5fa8019a3f
SHA15551f9432b76b106cbd5c8af6b84a1f233df5054
SHA2569a4e9d094607863b3ea8a611aa8614d1ea6626363228a2dc35982ca2e537e5a0
SHA5125761b7a6d5e45123312be9865ecb94c6c001acac09e0dea6b555460435ceaef734dd67fe17a8048c8fd13c0256d620d349619da726dec7cedcb3f315ebbef293
-
C:\Users\Admin\AppData\Local\Temp\a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd
Filesize1.2MB
MD50fbf9ce79e1cb0b6f70d7c5fa8019a3f
SHA15551f9432b76b106cbd5c8af6b84a1f233df5054
SHA2569a4e9d094607863b3ea8a611aa8614d1ea6626363228a2dc35982ca2e537e5a0
SHA5125761b7a6d5e45123312be9865ecb94c6c001acac09e0dea6b555460435ceaef734dd67fe17a8048c8fd13c0256d620d349619da726dec7cedcb3f315ebbef293
-
Filesize
53KB
MD5bf3bcd752bdabfa1f1e84b7462738103
SHA134cb8ea7d47467cace271e03b7869f37b0ecb30a
SHA25690fe790e189c384f2ab82958057f91fdf40888c2ed3c0471bd7b85d5b36c7810
SHA5126d5362c4d354319845f4522e0d1132c32a6779efc4c013c8c7bd489fddf39cbb5dfb72b135487b660d156d7774e5be4acc03c3fcecdb6dabcfad12630a3f5955
-
Filesize
2.9MB
MD545959b3d2bde20435a9aeed861046506
SHA1af9737ecd4988dd8d9af8231656779a471f072ea
SHA256c75ab62eca1d523e9db23fb8d018fbc99f336a36f70f0cc39c941b992b69d443
SHA51237b13465749b79b284d2d54b948c7602a7c2b19a08c03da40bd2fc665829246d95446c5f06380db3ba1995a18236cd1c1c0d046227cf41af8b2ff3793bfef40b
-
Filesize
1.2MB
MD590670935c60e18c1f92b28844f87ef6f
SHA1bf92cb0b8599d5bb8f51519c90ca4202a362691d
SHA25653f97106c73d141674f02d7583af055e421c83ec506bf08d1baf05a224ed893a
SHA512e4ac59c96b84d2ebf6da5d13701b2a5bdd1840bf0529d49adeef3471f2cfb7e6f6b723df94c17e503ea4bdc5f45a39ce11cb748298401bc69b6fa9ce475e0644
-
Filesize
1.2MB
MD590670935c60e18c1f92b28844f87ef6f
SHA1bf92cb0b8599d5bb8f51519c90ca4202a362691d
SHA25653f97106c73d141674f02d7583af055e421c83ec506bf08d1baf05a224ed893a
SHA512e4ac59c96b84d2ebf6da5d13701b2a5bdd1840bf0529d49adeef3471f2cfb7e6f6b723df94c17e503ea4bdc5f45a39ce11cb748298401bc69b6fa9ce475e0644
-
Filesize
8KB
MD53ece427082f114c269627a0738596608
SHA1f6af6a66352fc4ea9e0b12ec9a38e790518e7d8f
SHA256486b0c2d0edc32b0cf4c83b6909b8af9726ef036089faee51104c9aede17225a
SHA512f024c86be9a5de97459411e7bd4cac18228d0dd77a96aa5f25168c3d4ff657067cf66d326923c16ad38913dff5b6fb16868f4207fa1101218ef4ce1b2a04b0c5
-
Filesize
76KB
MD5f7e8cba3b1d36a6a7334960278e309ba
SHA1c01f4e83952cd545170c16109b89bbb640a04b5b
SHA256e3d20d6ad818a918b26405e206f58143578823560c15172ca729fb21b5030c48
SHA51263a943ec57f2443d0fc13400f71c7007f0e68ae1adddd336bc229ec68a64b819de04ab22448d6a9f98344c4f601eece3eda70be8683095f81c9036de7091c173
-
Filesize
76KB
MD5f7e8cba3b1d36a6a7334960278e309ba
SHA1c01f4e83952cd545170c16109b89bbb640a04b5b
SHA256e3d20d6ad818a918b26405e206f58143578823560c15172ca729fb21b5030c48
SHA51263a943ec57f2443d0fc13400f71c7007f0e68ae1adddd336bc229ec68a64b819de04ab22448d6a9f98344c4f601eece3eda70be8683095f81c9036de7091c173
-
\Users\Admin\AppData\Local\Temp\a86ec9765cbafd0c799874ff87a57e27513b3163562f523377f47f3284a2ad7d.hwd
Filesize1.2MB
MD50fbf9ce79e1cb0b6f70d7c5fa8019a3f
SHA15551f9432b76b106cbd5c8af6b84a1f233df5054
SHA2569a4e9d094607863b3ea8a611aa8614d1ea6626363228a2dc35982ca2e537e5a0
SHA5125761b7a6d5e45123312be9865ecb94c6c001acac09e0dea6b555460435ceaef734dd67fe17a8048c8fd13c0256d620d349619da726dec7cedcb3f315ebbef293
-
Filesize
3KB
MD55cd56a89f090c3dd0b4d98dfeb3b648d
SHA17c1a2a72cdd2f13bd095a4d2eda6b3a9806e7334
SHA25671d1f1bdaaf23618aa36f6e648b35aada1dc6f1ad0eaf8570cdab5f26d8601a9
SHA512e69a2eb5e8d21da58478fe99ee86341a735bdc3ee05caeb05ae388e9f82f4f577cb687381dc64060cffc6fe5b835a6c104b06b8d6dcc19337cdc48f1a69927ae
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
50KB
MD571169d851cbc95619f00bddcfc812580
SHA10307b4081385e8d8512d0f592559b64ecab72f89
SHA25626931f6c02b2a06be06d2327233240df201032b432a0d3402fbb000391b62721
SHA5120f35a8ca4917101756c096fda4a2278b585af914f716578f4ed36e21b4805168dd8648a9eaf4c7dc808a0e43c73281284c7067db521491d3a34d6ea9780bea09
-
Filesize
50KB
MD571169d851cbc95619f00bddcfc812580
SHA10307b4081385e8d8512d0f592559b64ecab72f89
SHA25626931f6c02b2a06be06d2327233240df201032b432a0d3402fbb000391b62721
SHA5120f35a8ca4917101756c096fda4a2278b585af914f716578f4ed36e21b4805168dd8648a9eaf4c7dc808a0e43c73281284c7067db521491d3a34d6ea9780bea09
-
Filesize
17KB
MD588ad3fd90fc52ac3ee0441a38400a384
SHA108bc9e1f5951b54126b5c3c769e3eaed42f3d10b
SHA256e58884695378cf02715373928bb8ade270baf03144369463f505c3b3808cbc42
SHA512359496f571e6fa2ec4c5ab5bd1d35d1330586f624228713ae55c65a69e07d8623022ef54337c22c3aab558a9b74d9977c8436f5fea4194899d9ef3ffd74e7dbb
-
Filesize
8KB
MD53ece427082f114c269627a0738596608
SHA1f6af6a66352fc4ea9e0b12ec9a38e790518e7d8f
SHA256486b0c2d0edc32b0cf4c83b6909b8af9726ef036089faee51104c9aede17225a
SHA512f024c86be9a5de97459411e7bd4cac18228d0dd77a96aa5f25168c3d4ff657067cf66d326923c16ad38913dff5b6fb16868f4207fa1101218ef4ce1b2a04b0c5
-
Filesize
2.9MB
MD545959b3d2bde20435a9aeed861046506
SHA1af9737ecd4988dd8d9af8231656779a471f072ea
SHA256c75ab62eca1d523e9db23fb8d018fbc99f336a36f70f0cc39c941b992b69d443
SHA51237b13465749b79b284d2d54b948c7602a7c2b19a08c03da40bd2fc665829246d95446c5f06380db3ba1995a18236cd1c1c0d046227cf41af8b2ff3793bfef40b
-
Filesize
2.9MB
MD545959b3d2bde20435a9aeed861046506
SHA1af9737ecd4988dd8d9af8231656779a471f072ea
SHA256c75ab62eca1d523e9db23fb8d018fbc99f336a36f70f0cc39c941b992b69d443
SHA51237b13465749b79b284d2d54b948c7602a7c2b19a08c03da40bd2fc665829246d95446c5f06380db3ba1995a18236cd1c1c0d046227cf41af8b2ff3793bfef40b
-
Filesize
1.2MB
MD590670935c60e18c1f92b28844f87ef6f
SHA1bf92cb0b8599d5bb8f51519c90ca4202a362691d
SHA25653f97106c73d141674f02d7583af055e421c83ec506bf08d1baf05a224ed893a
SHA512e4ac59c96b84d2ebf6da5d13701b2a5bdd1840bf0529d49adeef3471f2cfb7e6f6b723df94c17e503ea4bdc5f45a39ce11cb748298401bc69b6fa9ce475e0644
-
Filesize
76KB
MD5f7e8cba3b1d36a6a7334960278e309ba
SHA1c01f4e83952cd545170c16109b89bbb640a04b5b
SHA256e3d20d6ad818a918b26405e206f58143578823560c15172ca729fb21b5030c48
SHA51263a943ec57f2443d0fc13400f71c7007f0e68ae1adddd336bc229ec68a64b819de04ab22448d6a9f98344c4f601eece3eda70be8683095f81c9036de7091c173
-
Filesize
76KB
MD5f7e8cba3b1d36a6a7334960278e309ba
SHA1c01f4e83952cd545170c16109b89bbb640a04b5b
SHA256e3d20d6ad818a918b26405e206f58143578823560c15172ca729fb21b5030c48
SHA51263a943ec57f2443d0fc13400f71c7007f0e68ae1adddd336bc229ec68a64b819de04ab22448d6a9f98344c4f601eece3eda70be8683095f81c9036de7091c173