Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 06:25
Behavioral task
behavioral1
Sample
c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe
Resource
win7-20220812-en
General
-
Target
c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe
-
Size
298KB
-
MD5
a2b2eb1ec78a52bc6b25145a07a96b50
-
SHA1
f962b89d593d9dfba4936104b2360c9af00e6008
-
SHA256
c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6
-
SHA512
e4f35700794b92943404c90911477fed32e490f9eaab0f5254b5a102eee8bf473652e2d36ae8531a769ca92a1763bb13057af53f4fe6b0ebede25d5cf6334a30
-
SSDEEP
6144:ruIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIY7:S6Wq4aaE6KwyF5L0Y2D1PqL4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 2 IoCs
pid Process 1896 svhost.exe 956 svhost.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/files/0x000c0000000054a8-58.dat upx behavioral1/files/0x000c0000000054a8-60.dat upx behavioral1/memory/768-62-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1896-64-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/956-65-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/1896-66-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/768-67-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral1/memory/956-68-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\p: svhost.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/768-62-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1896-64-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/956-65-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/1896-66-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/768-67-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral1/memory/956-68-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Driver.db svhost.exe File created C:\Windows\svhost.exe c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 1896 svhost.exe 956 svhost.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 1896 svhost.exe 956 svhost.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 1896 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 1896 svhost.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe 956 svhost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 768 wrote to memory of 1896 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 27 PID 768 wrote to memory of 1896 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 27 PID 768 wrote to memory of 1896 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 27 PID 768 wrote to memory of 1896 768 c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe 27 PID 1896 wrote to memory of 956 1896 svhost.exe 28 PID 1896 wrote to memory of 956 1896 svhost.exe 28 PID 1896 wrote to memory of 956 1896 svhost.exe 28 PID 1896 wrote to memory of 956 1896 svhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe"C:\Users\Admin\AppData\Local\Temp\c6aff81b7ce6c318239195bcca08ed142d989562730370d855f424855f58e8e6.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\svhost.exeC:\Windows\svhost.exe3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:956
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5ceb848bec02621b6f80279aa9997aae3
SHA1effb4ee17b89bbb3e3c4e346664f8049fa186439
SHA2562eb3072459fe567d1ce22ab71b4cd4a87df9244907dff9a9f7744d569300c11e
SHA512584b63aadb75996a0c6fdbae47a90f252f59906e6eee2f251b0a3707fa02e2dd838eebaf966348029029f85c72c079d644212ee10ea34e1bc17fbf400d9191f5
-
Filesize
298KB
MD5ceb848bec02621b6f80279aa9997aae3
SHA1effb4ee17b89bbb3e3c4e346664f8049fa186439
SHA2562eb3072459fe567d1ce22ab71b4cd4a87df9244907dff9a9f7744d569300c11e
SHA512584b63aadb75996a0c6fdbae47a90f252f59906e6eee2f251b0a3707fa02e2dd838eebaf966348029029f85c72c079d644212ee10ea34e1bc17fbf400d9191f5
-
Filesize
298KB
MD5ceb848bec02621b6f80279aa9997aae3
SHA1effb4ee17b89bbb3e3c4e346664f8049fa186439
SHA2562eb3072459fe567d1ce22ab71b4cd4a87df9244907dff9a9f7744d569300c11e
SHA512584b63aadb75996a0c6fdbae47a90f252f59906e6eee2f251b0a3707fa02e2dd838eebaf966348029029f85c72c079d644212ee10ea34e1bc17fbf400d9191f5