Analysis
-
max time kernel
166s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 08:32
Behavioral task
behavioral1
Sample
2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe
Resource
win10v2004-20220812-en
General
-
Target
2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe
-
Size
252KB
-
MD5
85166cbfde3ea8b97854ba6832000696
-
SHA1
489e057da7c536ca1ae4d7e3ca32b66f919c703c
-
SHA256
2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543
-
SHA512
dd9958c29272b969e79748227dea383dcb959b3fe7b0d41ec831e58709df4e55eefa4497ecc44ae88731fd6036b6c5a4fc6490e3a541856b862cce93ee821408
-
SSDEEP
3072:B51kljkliKj1FZTmsijT7ejdag5GnTJUBxm1gYQANES7gujbWt0iUEQUjFOLpeO6:31wkbei/5GTJU4gY3LEuPU0D6O1lIz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe scvhosti.exe" 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/2620-132-0x0000000000400000-0x0000000000496000-memory.dmp upx behavioral2/memory/2620-137-0x0000000000400000-0x0000000000496000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\scvhosti.exe" 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\q: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\y: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\z: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\b: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\g: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\i: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\n: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\p: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\r: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\u: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\x: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\e: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\f: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\h: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\j: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\w: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\k: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\m: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\t: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\v: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\a: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\l: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened (read-only) \??\s: 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2620-137-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\setting.ini 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File created C:\Windows\SysWOW64\scvhosti.exe 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened for modification C:\Windows\SysWOW64\scvhosti.exe 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File created C:\Windows\SysWOW64\anhui.exe 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened for modification C:\Windows\SysWOW64\anhui.exe 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened for modification C:\Windows\SysWOW64\autorun.ini 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File created C:\Windows\SysWOW64\setting.ini 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\scvhosti.exe 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe File opened for modification C:\Windows\scvhosti.exe 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2620 wrote to memory of 5032 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 81 PID 2620 wrote to memory of 5032 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 81 PID 2620 wrote to memory of 5032 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 81 PID 5032 wrote to memory of 3680 5032 cmd.exe 83 PID 5032 wrote to memory of 3680 5032 cmd.exe 83 PID 5032 wrote to memory of 3680 5032 cmd.exe 83 PID 2620 wrote to memory of 4408 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 84 PID 2620 wrote to memory of 4408 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 84 PID 2620 wrote to memory of 4408 2620 2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe 84 PID 4408 wrote to memory of 4276 4408 cmd.exe 86 PID 4408 wrote to memory of 4276 4408 cmd.exe 86 PID 4408 wrote to memory of 4276 4408 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe"C:\Users\Admin\AppData\Local\Temp\2136efb6967841815f0917d6bc791e9d4796822fcac20f7feb6831b370d31543.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\anhui.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\anhui.exe3⤵PID:4276
-
-