Analysis
-
max time kernel
44s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe
Resource
win10v2004-20220901-en
General
-
Target
605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe
-
Size
300KB
-
MD5
84366e7385c9a6926c3fd8a69d9dbe20
-
SHA1
f855d85bb0a1105837d359738ac0c96e59311da7
-
SHA256
605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0
-
SHA512
8540bc08f88b80aa09eeda4ed62e19317d3306a19f1cbce7db1e0c9c400b1535906541020e5a20d96cd79a78d9da8602f65bee2369548d99cbfde9be65575a13
-
SSDEEP
3072:DdNiSobI2cqnLk0YZ5+4BNNhdxQTynpAJTjQdmKKpE6zoXkdckDeV3QtNBOTe7Uh:JoI2cqnUZ51NHqynkodapE+BeV3QB
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-57.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-59.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-64.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-63.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-62.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-61.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1696 PvOu.exe -
Loads dropped DLL 5 IoCs
pid Process 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 1696 PvOu.exe 1696 PvOu.exe 1696 PvOu.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe PvOu.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe PvOu.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe PvOu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE PvOu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe PvOu.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe PvOu.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe PvOu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE PvOu.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe PvOu.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe PvOu.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe PvOu.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe PvOu.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe PvOu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE PvOu.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe PvOu.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE PvOu.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe PvOu.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe PvOu.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler64.exe PvOu.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\chrome_installer.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe PvOu.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe PvOu.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe PvOu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE PvOu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe PvOu.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe PvOu.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe PvOu.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe PvOu.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe PvOu.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe PvOu.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe PvOu.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe PvOu.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe PvOu.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe PvOu.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe PvOu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 548 wrote to memory of 1696 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 27 PID 548 wrote to memory of 1696 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 27 PID 548 wrote to memory of 1696 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 27 PID 548 wrote to memory of 1696 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 27 PID 548 wrote to memory of 1696 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 27 PID 548 wrote to memory of 1696 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 27 PID 548 wrote to memory of 1696 548 605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe 27 PID 1696 wrote to memory of 804 1696 PvOu.exe 30 PID 1696 wrote to memory of 804 1696 PvOu.exe 30 PID 1696 wrote to memory of 804 1696 PvOu.exe 30 PID 1696 wrote to memory of 804 1696 PvOu.exe 30 PID 1696 wrote to memory of 804 1696 PvOu.exe 30 PID 1696 wrote to memory of 804 1696 PvOu.exe 30 PID 1696 wrote to memory of 804 1696 PvOu.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe"C:\Users\Admin\AppData\Local\Temp\605968047432b8aa75f3513c73e6a0038dc52d5e6586da2e08e9adff0c4ca6c0.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\PvOu.exeC:\Users\Admin\AppData\Local\Temp\PvOu.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\03170bf7.bat" "3⤵PID:804
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD56b336ae5c18ea596eecbbba1970689d6
SHA16d081e381e52dec190600c8c999568815c96f586
SHA256794a285fcd505f2bdd0d71ba4b614ab5a3c6e3479d0e0f56c7dadbefd417e3ad
SHA512719046d2eb3b779757bdac9d3f35cf9a427b304a02bfe8823387c23450d3aa0e0b7068ca773e2e8a57e3c05339c18f25c1f12609449906e61885d153ca19a7a1
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e