Analysis
-
max time kernel
142s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe
Resource
win10v2004-20220812-en
General
-
Target
ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe
-
Size
373KB
-
MD5
81db7c4a75845432c6465d971fc0c160
-
SHA1
fea0ae4caa595a9b444ace4b64f0d35b3f8b78ce
-
SHA256
ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba
-
SHA512
23464d2c56d74825238565b5855b66fd5e9dd6f4abbb2eec46020b2d966fa3ad91fc4333a51bc57d54826d383bc6139405a5a1cccf208136ed857956561ae30e
-
SSDEEP
6144:dcIhoZH+MWDYLZvzN5V+pOrVXl7HWrE+icB8aa36OCwb7eEk8vEE+M1P:2IhEWDYLZvEEXVHGbKaW60b7eX8vEkP
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-58.dat aspack_v212_v242 behavioral1/files/0x0007000000014124-60.dat aspack_v212_v242 behavioral1/files/0x0008000000013a13-70.dat aspack_v212_v242 behavioral1/files/0x0008000000013a13-71.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1408 4c856ba6.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 4c856ba6.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/memory/1408-59-0x0000000000250000-0x0000000000298000-memory.dmp upx behavioral1/files/0x0007000000014124-60.dat upx behavioral1/memory/1408-65-0x0000000000250000-0x0000000000298000-memory.dmp upx behavioral1/files/0x0008000000013a13-70.dat upx behavioral1/files/0x0008000000013a13-71.dat upx behavioral1/memory/960-73-0x00000000741F0000-0x0000000074238000-memory.dmp upx behavioral1/memory/960-75-0x00000000741F0000-0x0000000074238000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1408 4c856ba6.exe 960 Svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\4E8604E8.tmp 4c856ba6.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 4c856ba6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1408 4c856ba6.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1408 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe 27 PID 2036 wrote to memory of 1408 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe 27 PID 2036 wrote to memory of 1408 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe 27 PID 2036 wrote to memory of 1408 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe 27 PID 2036 wrote to memory of 1408 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe 27 PID 2036 wrote to memory of 1408 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe 27 PID 2036 wrote to memory of 1408 2036 ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe"C:\Users\Admin\AppData\Local\Temp\ffd2cd3152d78a2c7dd8815696095820ef52b30640dd04928165a831048e22ba.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\4c856ba6.exeC:\4c856ba6.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Windows\SysWOW64\Svchost.exeC:\Windows\SysWOW64\Svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD5585c2390e02463e6711265e605eff0c7
SHA1d076affdb51cb988509555f866d576aa309cf380
SHA25609b7625008038ff223761acf9bac6bc4794700f336b99b1d1891b58c293bb082
SHA512c829a8b6e70dcf42f6586a8cb0026b7289db55c56d39c7f712b3e43addb7a66eb83fd89cfa39fb306edc1b3db10c0dda7d05aeceddac94fe4a393427c60277f6
-
Filesize
222KB
MD5585c2390e02463e6711265e605eff0c7
SHA1d076affdb51cb988509555f866d576aa309cf380
SHA25609b7625008038ff223761acf9bac6bc4794700f336b99b1d1891b58c293bb082
SHA512c829a8b6e70dcf42f6586a8cb0026b7289db55c56d39c7f712b3e43addb7a66eb83fd89cfa39fb306edc1b3db10c0dda7d05aeceddac94fe4a393427c60277f6
-
Filesize
724B
MD52f5bb8c7342cebd28b6d35531e6fd835
SHA1a05ee68662b96511a085a2bf8b17b5e9b85313e9
SHA256e5c454669146f6d91cf76b7e574c6ac2aa571b4a34e57bf238a92051e9012155
SHA512cbb82a82747c477e8d4a53f56afae66bbe18ce80cdd77d282303c7ada2c465bcfeac243a64670ad40a571670c3ced408465b1925d272d237bd73704d3f505b6e
-
Filesize
222KB
MD5eca252e84ada8d896458393bfb62d022
SHA15f200c89df8d196e64987c3f6b61da52dcead693
SHA256b0037b149a64cba1f5c382cd87e5d7a5ba6bf9ed1866c3af8cbf2c7e50bb5a1e
SHA512dba28a7af38c222699405a98f34fabec2783a5842b3573cf432e050cf8f07013bc396b081842bd0625e33b6941ed90d2463eca8c66020db237cf61104fbb7484
-
Filesize
222KB
MD5eca252e84ada8d896458393bfb62d022
SHA15f200c89df8d196e64987c3f6b61da52dcead693
SHA256b0037b149a64cba1f5c382cd87e5d7a5ba6bf9ed1866c3af8cbf2c7e50bb5a1e
SHA512dba28a7af38c222699405a98f34fabec2783a5842b3573cf432e050cf8f07013bc396b081842bd0625e33b6941ed90d2463eca8c66020db237cf61104fbb7484
-
Filesize
222KB
MD5eca252e84ada8d896458393bfb62d022
SHA15f200c89df8d196e64987c3f6b61da52dcead693
SHA256b0037b149a64cba1f5c382cd87e5d7a5ba6bf9ed1866c3af8cbf2c7e50bb5a1e
SHA512dba28a7af38c222699405a98f34fabec2783a5842b3573cf432e050cf8f07013bc396b081842bd0625e33b6941ed90d2463eca8c66020db237cf61104fbb7484