Analysis
-
max time kernel
151s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 19:58
Static task
static1
Behavioral task
behavioral1
Sample
ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe
Resource
win10v2004-20220812-en
General
-
Target
ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe
-
Size
392KB
-
MD5
84d3c777e7a9d59f654bae245fd0c0b0
-
SHA1
c4278de865932e4c2587f56492fa6e752b98e45f
-
SHA256
ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7
-
SHA512
8999bc1c23ecea81c6e28c35d7182ce868e8066df08e474d344a67a3741bfa983bd64e8814e5074bff2ebc2d21c82b9034bc2933de409fae4b90a3addd149939
-
SSDEEP
12288:7t8vVED3Bk0Mr9Vif7/F1hIIaYHuvAIS2t:7t+gvMpVij/F1hV5HuvAI7
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 276 achsv.exe 1768 COM7.EXE 992 COM7.EXE 1188 achsv.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PDF FoxitReader.exe COM7.EXE -
Loads dropped DLL 8 IoCs
pid Process 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 276 achsv.exe 276 achsv.exe 1768 COM7.EXE 1768 COM7.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\COMLOADER = "\\\\.\\C:\\Program Files\\FoxitReader\\bin\\COM7.EXE" reg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\FoxitReader\bin\COM7.EXE COM7.EXE File created C:\Program Files\FoxitReader\FoxitReader.exe COM7.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1668 reg.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 276 achsv.exe 1768 COM7.EXE 992 COM7.EXE 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1188 achsv.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1768 COM7.EXE 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1768 COM7.EXE 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1768 COM7.EXE 1768 COM7.EXE 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1768 COM7.EXE 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 1768 COM7.EXE 1768 COM7.EXE 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 276 achsv.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1116 wrote to memory of 276 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 28 PID 1116 wrote to memory of 276 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 28 PID 1116 wrote to memory of 276 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 28 PID 1116 wrote to memory of 276 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 28 PID 1116 wrote to memory of 1768 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 29 PID 1116 wrote to memory of 1768 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 29 PID 1116 wrote to memory of 1768 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 29 PID 1116 wrote to memory of 1768 1116 ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe 29 PID 276 wrote to memory of 992 276 achsv.exe 30 PID 276 wrote to memory of 992 276 achsv.exe 30 PID 276 wrote to memory of 992 276 achsv.exe 30 PID 276 wrote to memory of 992 276 achsv.exe 30 PID 1768 wrote to memory of 1668 1768 COM7.EXE 31 PID 1768 wrote to memory of 1668 1768 COM7.EXE 31 PID 1768 wrote to memory of 1668 1768 COM7.EXE 31 PID 1768 wrote to memory of 1668 1768 COM7.EXE 31 PID 1768 wrote to memory of 1188 1768 COM7.EXE 33 PID 1768 wrote to memory of 1188 1768 COM7.EXE 33 PID 1768 wrote to memory of 1188 1768 COM7.EXE 33 PID 1768 wrote to memory of 1188 1768 COM7.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe"C:\Users\Admin\AppData\Local\Temp\ed1f8e1d2cd12b19e50282d6d637fae6997edcf7664881c6d97c9235a67319b7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\COM7.EXE2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /t REG_SZ /v COMLOADER /d "\\.\C:\Program Files\FoxitReader\bin\COM7.EXE"3⤵
- Adds Run key to start application
- Modifies registry key
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe\\.\C:\Users\Admin\AppData\Local\Temp\Rar$EX7.src777\achsv.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5757d757e9d65d4228c63b120d95bee93
SHA16e6f1f0f643858b2356a82ce0d0864d3233e9a49
SHA256116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5
SHA512b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165
-
Filesize
392KB
MD5757d757e9d65d4228c63b120d95bee93
SHA16e6f1f0f643858b2356a82ce0d0864d3233e9a49
SHA256116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5
SHA512b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165
-
Filesize
392KB
MD5757d757e9d65d4228c63b120d95bee93
SHA16e6f1f0f643858b2356a82ce0d0864d3233e9a49
SHA256116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5
SHA512b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165
-
Filesize
392KB
MD539406608c3bc6a1fac873433268b5e6b
SHA1a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a
SHA256a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45
SHA512e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7
-
Filesize
392KB
MD539406608c3bc6a1fac873433268b5e6b
SHA1a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a
SHA256a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45
SHA512e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7
-
Filesize
392KB
MD539406608c3bc6a1fac873433268b5e6b
SHA1a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a
SHA256a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45
SHA512e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7
-
Filesize
392KB
MD5757d757e9d65d4228c63b120d95bee93
SHA16e6f1f0f643858b2356a82ce0d0864d3233e9a49
SHA256116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5
SHA512b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165
-
Filesize
392KB
MD5757d757e9d65d4228c63b120d95bee93
SHA16e6f1f0f643858b2356a82ce0d0864d3233e9a49
SHA256116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5
SHA512b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165
-
Filesize
392KB
MD5757d757e9d65d4228c63b120d95bee93
SHA16e6f1f0f643858b2356a82ce0d0864d3233e9a49
SHA256116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5
SHA512b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165
-
Filesize
392KB
MD5757d757e9d65d4228c63b120d95bee93
SHA16e6f1f0f643858b2356a82ce0d0864d3233e9a49
SHA256116706a7f00067693846e0797bc585947934e1c49160fc217734544925b770b5
SHA512b8b3f8f4248c337fa841e97b8d5e5111185bef74bf0ef3303321ee77ad20ea5784d7d725cb897dcd76a03de0969993b6a15482d5587c42ffd20b572ed8784165
-
Filesize
392KB
MD539406608c3bc6a1fac873433268b5e6b
SHA1a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a
SHA256a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45
SHA512e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7
-
Filesize
392KB
MD539406608c3bc6a1fac873433268b5e6b
SHA1a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a
SHA256a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45
SHA512e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7
-
Filesize
392KB
MD539406608c3bc6a1fac873433268b5e6b
SHA1a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a
SHA256a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45
SHA512e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7
-
Filesize
392KB
MD539406608c3bc6a1fac873433268b5e6b
SHA1a8ba6a5a0cce01c4dc64dd2bb6f1a1dd4bc2d84a
SHA256a236b7ed156e401c170020bfbb7d95c2522326dedfbbed2888dd4ff3ae915f45
SHA512e9477d4889f75ec9ac4d1a81d0f4b0242750ad00343c9809253961bf5b390787f227edc50ced79bbe7af7b8c3e6917e77ea177bbd0b6990fa2a129bee44c9aa7