Analysis
-
max time kernel
152s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 05:26
Static task
static1
Behavioral task
behavioral1
Sample
b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe
Resource
win10v2004-20220812-en
General
-
Target
b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe
-
Size
122KB
-
MD5
052987e8936df481fcfc85ddf9e6fee6
-
SHA1
4fb863617d76cbe1572df02c6e0c951b3ea9d731
-
SHA256
b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689
-
SHA512
27e6a53a9d678e50d1c982f6376b824445064cb80c0ad8d3ea7e7f1751e6e9def9823ca8bafe509bc322fb0ed8ebf125479b624a3ceecb377dee88ab6cfd5eef
-
SSDEEP
1536:nFyzF9MFVCujlsQoeQZZ86ukpj0nGGF9v+4DR5X:FyzQVCujl71QZZ4kp4F9Xtx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 544 explorer.exe 3936 spoolsv.exe 4896 svchost.exe 2460 spoolsv.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\System\tjud.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3712 b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe 3712 b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe 544 explorer.exe 544 explorer.exe 4896 svchost.exe 4896 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 544 explorer.exe 4896 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3712 b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe 3712 b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe 544 explorer.exe 544 explorer.exe 3936 spoolsv.exe 3936 spoolsv.exe 4896 svchost.exe 4896 svchost.exe 2460 spoolsv.exe 2460 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3712 wrote to memory of 544 3712 b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe 80 PID 3712 wrote to memory of 544 3712 b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe 80 PID 3712 wrote to memory of 544 3712 b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe 80 PID 544 wrote to memory of 3936 544 explorer.exe 81 PID 544 wrote to memory of 3936 544 explorer.exe 81 PID 544 wrote to memory of 3936 544 explorer.exe 81 PID 3936 wrote to memory of 4896 3936 spoolsv.exe 82 PID 3936 wrote to memory of 4896 3936 spoolsv.exe 82 PID 3936 wrote to memory of 4896 3936 spoolsv.exe 82 PID 4896 wrote to memory of 2460 4896 svchost.exe 83 PID 4896 wrote to memory of 2460 4896 svchost.exe 83 PID 4896 wrote to memory of 2460 4896 svchost.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe"C:\Users\Admin\AppData\Local\Temp\b095b45efce9e6ac37c9081b9d4ac79f076b43c3d44eddc8f9ab6281b4a40689.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3712 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD576726a9daedc6df811c5d55b5148de03
SHA1cfaebd97f26a509152e52f76d179fa329f1f5ba4
SHA25659bffd58ddec85b901478994562bb477bacafc81dc2685c3f64cf9f51a7250b7
SHA51245fe66b5de243749ab0ab197c4d66561c9627ef9048cd493cc64f9ee8678d0ede72d31134558237100677fa6dcf3254c493cdafb76dd3300bd2e78229f3e8e5d
-
Filesize
122KB
MD5d5a3f3bfa5b8c3fa1f3b93d49f33037c
SHA1ced2d546b26087950ba963923990d46334782887
SHA2560f7de3c127c86740a6dfeea274ddef9e624feca3b20333f705c089190fcdc06e
SHA5128298d1aa66a7e0a90539769cd3111209004a3948217c094907389fd71e6ef7ef8ae29e90dc627985cab019b0b6b706868712772794aa9be605d0bbf5cc81d3a2
-
Filesize
122KB
MD506cb2a9f8f7f706015554b633426b8b2
SHA1820469287901ac1854371ebe6a8dd03593d4eb24
SHA256e42720f0fa7dda6d063ffe2ddcca9838e73a4540891b095e6e93985bd58a65db
SHA512ea8422053caf2300cfe7dcc61f8f3e2face69e3ba524c60e397552b3904e9d83ecd00c9b704b1860ef607f1a46595b769b451e1c06bab6d21ea43074b6ad22ea
-
Filesize
122KB
MD506cb2a9f8f7f706015554b633426b8b2
SHA1820469287901ac1854371ebe6a8dd03593d4eb24
SHA256e42720f0fa7dda6d063ffe2ddcca9838e73a4540891b095e6e93985bd58a65db
SHA512ea8422053caf2300cfe7dcc61f8f3e2face69e3ba524c60e397552b3904e9d83ecd00c9b704b1860ef607f1a46595b769b451e1c06bab6d21ea43074b6ad22ea
-
Filesize
122KB
MD5b19d48d0ed07f2ebeb885ff8af128405
SHA1804ef6f3eb53e20a574027793c384659b5152c44
SHA2563544e7ad42d72989e1517a2c9fe33f3fadecde8a6f66bb4bba7d200a6ffcb4cb
SHA512bd100e6ca1ba4b3daab13fd6cfe4bb0659f981b21ac91ccbc494ee4794b2c250758da327883fe7d901f2e5d2afe65462a2ad731a77652baee50ca367eaa982b2
-
Filesize
122KB
MD5d5a3f3bfa5b8c3fa1f3b93d49f33037c
SHA1ced2d546b26087950ba963923990d46334782887
SHA2560f7de3c127c86740a6dfeea274ddef9e624feca3b20333f705c089190fcdc06e
SHA5128298d1aa66a7e0a90539769cd3111209004a3948217c094907389fd71e6ef7ef8ae29e90dc627985cab019b0b6b706868712772794aa9be605d0bbf5cc81d3a2
-
Filesize
122KB
MD506cb2a9f8f7f706015554b633426b8b2
SHA1820469287901ac1854371ebe6a8dd03593d4eb24
SHA256e42720f0fa7dda6d063ffe2ddcca9838e73a4540891b095e6e93985bd58a65db
SHA512ea8422053caf2300cfe7dcc61f8f3e2face69e3ba524c60e397552b3904e9d83ecd00c9b704b1860ef607f1a46595b769b451e1c06bab6d21ea43074b6ad22ea
-
Filesize
122KB
MD5b19d48d0ed07f2ebeb885ff8af128405
SHA1804ef6f3eb53e20a574027793c384659b5152c44
SHA2563544e7ad42d72989e1517a2c9fe33f3fadecde8a6f66bb4bba7d200a6ffcb4cb
SHA512bd100e6ca1ba4b3daab13fd6cfe4bb0659f981b21ac91ccbc494ee4794b2c250758da327883fe7d901f2e5d2afe65462a2ad731a77652baee50ca367eaa982b2