Analysis
-
max time kernel
173s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2022 16:13
Behavioral task
behavioral1
Sample
827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe
Resource
win10v2004-20220812-en
General
-
Target
827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe
-
Size
800KB
-
MD5
0805d96eb2c3d5122f32d5a822344b00
-
SHA1
dfdc48badbaf9308b4f39883142e124b419e980a
-
SHA256
827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9
-
SHA512
65a6a1a328f31ffb30a23b7e5c904c167b681bd42cb3cffce6b827095984eac57e61c5106f0b601844a5f5dd4d6aea0b0242ca74cb7f2814d9e70e0de8e51076
-
SSDEEP
6144:PTBcx19YgC8Ukq9NXcHNINzsr5IW4Fxpr7dTHbmdUnmXr3w798r4:PTB09SkkNXKgor5IWk3rkegrO
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe rundll.exe" 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral2/memory/768-132-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral2/memory/768-133-0x0000000000400000-0x0000000000535000-memory.dmp upx behavioral2/memory/768-135-0x0000000000400000-0x0000000000535000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\regsvr.exe" 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\system = "Winhelp.exe" 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/768-135-0x0000000000400000-0x0000000000535000-memory.dmp autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr.exe 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe File opened for modification C:\Windows\SysWOW64\regsvr.exe 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe File created C:\Windows\SysWOW64\winhelp.exe 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe File opened for modification C:\Windows\SysWOW64\winhelp.exe 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe File opened for modification C:\Windows\SysWOW64\setup.ini 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\winhelp.ini 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe File created C:\Windows\regsvr.exe 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe File opened for modification C:\Windows\regsvr.exe 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe File created C:\Windows\winhelp.ini 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 768 wrote to memory of 5084 768 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe 81 PID 768 wrote to memory of 5084 768 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe 81 PID 768 wrote to memory of 5084 768 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe 81 PID 5084 wrote to memory of 4896 5084 cmd.exe 84 PID 5084 wrote to memory of 4896 5084 cmd.exe 84 PID 5084 wrote to memory of 4896 5084 cmd.exe 84 PID 768 wrote to memory of 2416 768 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe 85 PID 768 wrote to memory of 2416 768 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe 85 PID 768 wrote to memory of 2416 768 827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe 85 PID 2416 wrote to memory of 4076 2416 cmd.exe 87 PID 2416 wrote to memory of 4076 2416 cmd.exe 87 PID 2416 wrote to memory of 4076 2416 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe"C:\Users\Admin\AppData\Local\Temp\827563c552eabaf7a926e0ee854db8fbf854dc91c2094e1a0d24d87ea57255b9.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\winhelp.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\winhelp.exe3⤵PID:4076
-
-