Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 02:28
Behavioral task
behavioral1
Sample
533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe
Resource
win10v2004-20220901-en
General
-
Target
533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe
-
Size
253KB
-
MD5
417aab2002ef244f2ad08e1b23dd5c40
-
SHA1
d56c94616b64246546b3e0fc83b74d4056a300ef
-
SHA256
533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2
-
SHA512
bea44b33dc67ea5d59738cab81c1eb33bc83aef4ebc1d6e52fe5d04c708724ff14ab2d8f71ccafa69d984bac3b1958e2a9e58b785909d4b48055e677892728ab
-
SSDEEP
6144:WD1foRVuFNslYq0O0KC/SOEt5zpaiRhcuGE07v6ITRx:LRSslYrMCfwNxRhTKj6I1x
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" startup.bat -
resource yara_rule behavioral2/files/0x0004000000022de2-137.dat aspack_v212_v242 behavioral2/files/0x0004000000022de2-138.dat aspack_v212_v242 behavioral2/files/0x0006000000022dc6-143.dat aspack_v212_v242 behavioral2/files/0x0006000000022dc6-144.dat aspack_v212_v242 behavioral2/files/0x0004000000022de2-155.dat aspack_v212_v242 behavioral2/files/0x0004000000022de2-158.dat aspack_v212_v242 behavioral2/files/0x0001000000022df5-162.dat aspack_v212_v242 behavioral2/files/0x0001000000022df5-163.dat aspack_v212_v242 behavioral2/files/0x0004000000022de2-174.dat aspack_v212_v242 behavioral2/files/0x0004000000022de2-177.dat aspack_v212_v242 behavioral2/files/0x0001000000022df8-181.dat aspack_v212_v242 behavioral2/files/0x0001000000022df8-182.dat aspack_v212_v242 -
Executes dropped EXE 5 IoCs
pid Process 1588 38ec7061.exe 2080 startup.bat 2840 38ec7061.exe 3080 startup.bat 1188 38ec7061.exe -
Sets DLL path for service in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 38ec7061.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 38ec7061.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 38ec7061.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 38ec7061.exe -
resource yara_rule behavioral2/memory/3252-135-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/files/0x0004000000022de2-137.dat upx behavioral2/files/0x0004000000022de2-138.dat upx behavioral2/memory/1588-139-0x0000000000C00000-0x0000000000C48000-memory.dmp upx behavioral2/memory/1588-140-0x0000000000C00000-0x0000000000C48000-memory.dmp upx behavioral2/memory/1588-141-0x0000000000C00000-0x0000000000C48000-memory.dmp upx behavioral2/files/0x0006000000022dc6-143.dat upx behavioral2/files/0x0006000000022dc6-144.dat upx behavioral2/memory/5048-145-0x00000000753E0000-0x0000000075428000-memory.dmp upx behavioral2/memory/5048-146-0x00000000753E0000-0x0000000075428000-memory.dmp upx behavioral2/memory/5048-148-0x00000000753E0000-0x0000000075428000-memory.dmp upx behavioral2/files/0x0004000000022dea-152.dat upx behavioral2/files/0x0004000000022dea-153.dat upx behavioral2/files/0x0004000000022de2-155.dat upx behavioral2/memory/2840-156-0x0000000000140000-0x0000000000188000-memory.dmp upx behavioral2/memory/2840-157-0x0000000000140000-0x0000000000188000-memory.dmp upx behavioral2/files/0x0004000000022de2-158.dat upx behavioral2/memory/2080-159-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/2840-160-0x0000000000140000-0x0000000000188000-memory.dmp upx behavioral2/files/0x0001000000022df5-162.dat upx behavioral2/files/0x0001000000022df5-163.dat upx behavioral2/memory/1860-164-0x00000000754D0000-0x0000000075518000-memory.dmp upx behavioral2/memory/1860-165-0x00000000754D0000-0x0000000075518000-memory.dmp upx behavioral2/memory/1860-167-0x00000000754D0000-0x0000000075518000-memory.dmp upx behavioral2/memory/3252-170-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/files/0x0004000000022dea-172.dat upx behavioral2/files/0x0004000000022de2-174.dat upx behavioral2/memory/1188-175-0x0000000000700000-0x0000000000748000-memory.dmp upx behavioral2/memory/1188-176-0x0000000000700000-0x0000000000748000-memory.dmp upx behavioral2/files/0x0004000000022de2-177.dat upx behavioral2/memory/1188-178-0x0000000000700000-0x0000000000748000-memory.dmp upx behavioral2/memory/2080-180-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/files/0x0001000000022df8-181.dat upx behavioral2/memory/3092-183-0x0000000073990000-0x00000000739D8000-memory.dmp upx behavioral2/files/0x0001000000022df8-182.dat upx behavioral2/memory/3092-184-0x0000000073990000-0x00000000739D8000-memory.dmp upx behavioral2/memory/3092-186-0x0000000073990000-0x00000000739D8000-memory.dmp upx behavioral2/memory/3080-189-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/2080-190-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 5048 Svchost.exe 1860 Svchost.exe 3092 Svchost.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\6A760BFC.tmp 38ec7061.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 38ec7061.exe File opened for modification C:\Windows\SysWOW64\74080BFC.tmp 38ec7061.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 38ec7061.exe File opened for modification C:\Windows\SysWOW64\19B30BFC.tmp 38ec7061.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 38ec7061.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 38ec7061.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff startup.bat Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings startup.bat Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell startup.bat Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU startup.bat Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots startup.bat -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1588 38ec7061.exe 1588 38ec7061.exe 2840 38ec7061.exe 2840 38ec7061.exe 1188 38ec7061.exe 1188 38ec7061.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3252 533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe 2080 startup.bat 3080 startup.bat -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3252 wrote to memory of 1588 3252 533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe 82 PID 3252 wrote to memory of 1588 3252 533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe 82 PID 3252 wrote to memory of 1588 3252 533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe 82 PID 3252 wrote to memory of 2080 3252 533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe 85 PID 3252 wrote to memory of 2080 3252 533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe 85 PID 3252 wrote to memory of 2080 3252 533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe 85 PID 2080 wrote to memory of 2840 2080 startup.bat 86 PID 2080 wrote to memory of 2840 2080 startup.bat 86 PID 2080 wrote to memory of 2840 2080 startup.bat 86 PID 2080 wrote to memory of 3080 2080 startup.bat 91 PID 2080 wrote to memory of 3080 2080 startup.bat 91 PID 2080 wrote to memory of 3080 2080 startup.bat 91 PID 3080 wrote to memory of 1188 3080 startup.bat 92 PID 3080 wrote to memory of 1188 3080 startup.bat 92 PID 3080 wrote to memory of 1188 3080 startup.bat 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe"C:\Users\Admin\AppData\Local\Temp\533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\38ec7061.exeC:\38ec7061.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\startup.bat"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\startup.bat"2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\38ec7061.exeC:\38ec7061.exe3⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\startup.bat"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\startup.bat"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\38ec7061.exeC:\38ec7061.exe4⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
-
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:5048
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
PID:1860
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1288
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
PID:3092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d095fc07616a410a603ce715c5cc7c9c
SHA1a33565449f95ed99e6594cf5692032c5434fedd3
SHA256b2377fd92e7d24e14549f1330e46a90c351aec6df06b21743291c4078a7d018a
SHA512dbe4d88dd117aefc2c2bd38d4f74947394744c252df96ac2f450f8981de79f32ffe351071f207dbe1399a16c7479d27f2c788c25decc7b91eb1c3fd9618babce
-
Filesize
224KB
MD5d095fc07616a410a603ce715c5cc7c9c
SHA1a33565449f95ed99e6594cf5692032c5434fedd3
SHA256b2377fd92e7d24e14549f1330e46a90c351aec6df06b21743291c4078a7d018a
SHA512dbe4d88dd117aefc2c2bd38d4f74947394744c252df96ac2f450f8981de79f32ffe351071f207dbe1399a16c7479d27f2c788c25decc7b91eb1c3fd9618babce
-
Filesize
224KB
MD5d095fc07616a410a603ce715c5cc7c9c
SHA1a33565449f95ed99e6594cf5692032c5434fedd3
SHA256b2377fd92e7d24e14549f1330e46a90c351aec6df06b21743291c4078a7d018a
SHA512dbe4d88dd117aefc2c2bd38d4f74947394744c252df96ac2f450f8981de79f32ffe351071f207dbe1399a16c7479d27f2c788c25decc7b91eb1c3fd9618babce
-
Filesize
224KB
MD5d095fc07616a410a603ce715c5cc7c9c
SHA1a33565449f95ed99e6594cf5692032c5434fedd3
SHA256b2377fd92e7d24e14549f1330e46a90c351aec6df06b21743291c4078a7d018a
SHA512dbe4d88dd117aefc2c2bd38d4f74947394744c252df96ac2f450f8981de79f32ffe351071f207dbe1399a16c7479d27f2c788c25decc7b91eb1c3fd9618babce
-
Filesize
224KB
MD5d095fc07616a410a603ce715c5cc7c9c
SHA1a33565449f95ed99e6594cf5692032c5434fedd3
SHA256b2377fd92e7d24e14549f1330e46a90c351aec6df06b21743291c4078a7d018a
SHA512dbe4d88dd117aefc2c2bd38d4f74947394744c252df96ac2f450f8981de79f32ffe351071f207dbe1399a16c7479d27f2c788c25decc7b91eb1c3fd9618babce
-
Filesize
224KB
MD5d095fc07616a410a603ce715c5cc7c9c
SHA1a33565449f95ed99e6594cf5692032c5434fedd3
SHA256b2377fd92e7d24e14549f1330e46a90c351aec6df06b21743291c4078a7d018a
SHA512dbe4d88dd117aefc2c2bd38d4f74947394744c252df96ac2f450f8981de79f32ffe351071f207dbe1399a16c7479d27f2c788c25decc7b91eb1c3fd9618babce
-
Filesize
253KB
MD5417aab2002ef244f2ad08e1b23dd5c40
SHA1d56c94616b64246546b3e0fc83b74d4056a300ef
SHA256533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2
SHA512bea44b33dc67ea5d59738cab81c1eb33bc83aef4ebc1d6e52fe5d04c708724ff14ab2d8f71ccafa69d984bac3b1958e2a9e58b785909d4b48055e677892728ab
-
Filesize
253KB
MD5417aab2002ef244f2ad08e1b23dd5c40
SHA1d56c94616b64246546b3e0fc83b74d4056a300ef
SHA256533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2
SHA512bea44b33dc67ea5d59738cab81c1eb33bc83aef4ebc1d6e52fe5d04c708724ff14ab2d8f71ccafa69d984bac3b1958e2a9e58b785909d4b48055e677892728ab
-
Filesize
253KB
MD5417aab2002ef244f2ad08e1b23dd5c40
SHA1d56c94616b64246546b3e0fc83b74d4056a300ef
SHA256533e979fa052e80833f16320312e253c9ee0bc5a517864244667b9de985b80c2
SHA512bea44b33dc67ea5d59738cab81c1eb33bc83aef4ebc1d6e52fe5d04c708724ff14ab2d8f71ccafa69d984bac3b1958e2a9e58b785909d4b48055e677892728ab
-
Filesize
724B
MD58df7b34d0fba4705e0c71f41266dc212
SHA1716801383e5ea153fcc6602929ba7e6e14cbfdca
SHA256b987e8cbe9b90c27db502694e1dd90bc861ecdabbd4c57648f0e78aab39516b4
SHA51205fd7c25f7ed2cd763ebefd7354e45b89b909934dc4cfea6b00a0c6d8d32c9012a495e92ae9e0e329b6d62520e399db764799217a96b370350de8445f4974963
-
Filesize
724B
MD595d242067e9fb3de4f5c5a5697a7faa8
SHA154ce230089453adbc0c6ba8f3a98c69b5fe5d0eb
SHA25690b500999f2bad748e34f7419307137deb87845c4abf06b531402be113e86193
SHA512fef66758b033f84b88376bf982bd5e8baec8a503b9d82447ceee3ed256e6d48a23ceef98c7914bbf22201eb5c56d7c87e43094f99c0ed6d81d3398319a1946f1
-
Filesize
724B
MD56dc3788171f9434f18c42d3b55730b78
SHA1d122b78c1b889b2cd96de4ff432249224b6eb501
SHA2567463d69b94e77e0dfb42106324a4cace8cf0e583713797299b78cf8d9a5d5d61
SHA51249ef1687777ffadbdf1d87a5498aef04517abcb2c75f63b197f8f8ebd55af221c99476ffb2de80ccfdf91e8fcd221e18fbd185bc1bf5b40681072aa19547d7e2
-
Filesize
224KB
MD53187fa18a6573326384ef6e05982d52a
SHA1b2e60371eec1e26ff2ee95c5bd0b02ecfe94be8e
SHA2565f552a37bc14402929821590010e86cdee62dbcf281fb201bc46faed901ca7cd
SHA51215147dc336609633a532bc5a56b96c60905d0d32fa9a311cbfaf667d54a50a19abcf70a2d119be3376f58547fc1068aa5a0005a926fc336dbd1bfc5a7d2bf4eb
-
Filesize
224KB
MD53187fa18a6573326384ef6e05982d52a
SHA1b2e60371eec1e26ff2ee95c5bd0b02ecfe94be8e
SHA2565f552a37bc14402929821590010e86cdee62dbcf281fb201bc46faed901ca7cd
SHA51215147dc336609633a532bc5a56b96c60905d0d32fa9a311cbfaf667d54a50a19abcf70a2d119be3376f58547fc1068aa5a0005a926fc336dbd1bfc5a7d2bf4eb
-
Filesize
224KB
MD53187fa18a6573326384ef6e05982d52a
SHA1b2e60371eec1e26ff2ee95c5bd0b02ecfe94be8e
SHA2565f552a37bc14402929821590010e86cdee62dbcf281fb201bc46faed901ca7cd
SHA51215147dc336609633a532bc5a56b96c60905d0d32fa9a311cbfaf667d54a50a19abcf70a2d119be3376f58547fc1068aa5a0005a926fc336dbd1bfc5a7d2bf4eb
-
Filesize
224KB
MD53187fa18a6573326384ef6e05982d52a
SHA1b2e60371eec1e26ff2ee95c5bd0b02ecfe94be8e
SHA2565f552a37bc14402929821590010e86cdee62dbcf281fb201bc46faed901ca7cd
SHA51215147dc336609633a532bc5a56b96c60905d0d32fa9a311cbfaf667d54a50a19abcf70a2d119be3376f58547fc1068aa5a0005a926fc336dbd1bfc5a7d2bf4eb
-
Filesize
224KB
MD53187fa18a6573326384ef6e05982d52a
SHA1b2e60371eec1e26ff2ee95c5bd0b02ecfe94be8e
SHA2565f552a37bc14402929821590010e86cdee62dbcf281fb201bc46faed901ca7cd
SHA51215147dc336609633a532bc5a56b96c60905d0d32fa9a311cbfaf667d54a50a19abcf70a2d119be3376f58547fc1068aa5a0005a926fc336dbd1bfc5a7d2bf4eb
-
Filesize
224KB
MD53187fa18a6573326384ef6e05982d52a
SHA1b2e60371eec1e26ff2ee95c5bd0b02ecfe94be8e
SHA2565f552a37bc14402929821590010e86cdee62dbcf281fb201bc46faed901ca7cd
SHA51215147dc336609633a532bc5a56b96c60905d0d32fa9a311cbfaf667d54a50a19abcf70a2d119be3376f58547fc1068aa5a0005a926fc336dbd1bfc5a7d2bf4eb