Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 16:08
Static task
static1
Behavioral task
behavioral1
Sample
a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe
Resource
win10v2004-20220812-en
General
-
Target
a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe
-
Size
160KB
-
MD5
06b1e92cb285460afb3cb7452caa6821
-
SHA1
e97c76bb84dfeb8dc1d8e4c906816ca6bb4cb1cf
-
SHA256
a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d
-
SHA512
3772073e7406003ae7639de0d82f20ce6411d23df4d315532e21ed7bc4f9d993aa7e1b1ce43bbdb783972ea4e141bce1d7986b584ef255a439582d8bcbaef293
-
SSDEEP
1536:3+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:3xbkuVbvLn7Uj3
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\17260 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msoitw.cmd" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1748 xplorer.exe 828 xplorer.exe 1536 xplorer.exe -
resource yara_rule behavioral1/memory/1188-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1188-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1188-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1188-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1188-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1188-67-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1188-99-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/828-100-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/828-107-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\xplorer = "C:\\Windows\\xplorer\\xplorer.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xplorer.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum xplorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 xplorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 620 set thread context of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 1748 set thread context of 828 1748 xplorer.exe 32 PID 1748 set thread context of 1536 1748 xplorer.exe 33 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msoitw.cmd svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\xplorer\xplorer.exe a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe File opened for modification C:\Windows\xplorer\xplorer.exe a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe File opened for modification C:\Windows\xplorer\xplorer.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1536 xplorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1536 xplorer.exe 1536 xplorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe Token: SeDebugPrivilege 828 xplorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 1748 xplorer.exe 828 xplorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 620 wrote to memory of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 620 wrote to memory of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 620 wrote to memory of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 620 wrote to memory of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 620 wrote to memory of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 620 wrote to memory of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 620 wrote to memory of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 620 wrote to memory of 1188 620 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 27 PID 1188 wrote to memory of 660 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 28 PID 1188 wrote to memory of 660 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 28 PID 1188 wrote to memory of 660 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 28 PID 1188 wrote to memory of 660 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 28 PID 660 wrote to memory of 1256 660 cmd.exe 30 PID 660 wrote to memory of 1256 660 cmd.exe 30 PID 660 wrote to memory of 1256 660 cmd.exe 30 PID 660 wrote to memory of 1256 660 cmd.exe 30 PID 1188 wrote to memory of 1748 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 31 PID 1188 wrote to memory of 1748 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 31 PID 1188 wrote to memory of 1748 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 31 PID 1188 wrote to memory of 1748 1188 a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe 31 PID 1748 wrote to memory of 828 1748 xplorer.exe 32 PID 1748 wrote to memory of 828 1748 xplorer.exe 32 PID 1748 wrote to memory of 828 1748 xplorer.exe 32 PID 1748 wrote to memory of 828 1748 xplorer.exe 32 PID 1748 wrote to memory of 828 1748 xplorer.exe 32 PID 1748 wrote to memory of 828 1748 xplorer.exe 32 PID 1748 wrote to memory of 828 1748 xplorer.exe 32 PID 1748 wrote to memory of 828 1748 xplorer.exe 32 PID 1748 wrote to memory of 1536 1748 xplorer.exe 33 PID 1748 wrote to memory of 1536 1748 xplorer.exe 33 PID 1748 wrote to memory of 1536 1748 xplorer.exe 33 PID 1748 wrote to memory of 1536 1748 xplorer.exe 33 PID 1748 wrote to memory of 1536 1748 xplorer.exe 33 PID 1748 wrote to memory of 1536 1748 xplorer.exe 33 PID 1748 wrote to memory of 1536 1748 xplorer.exe 33 PID 1536 wrote to memory of 1352 1536 xplorer.exe 34 PID 1536 wrote to memory of 1352 1536 xplorer.exe 34 PID 1536 wrote to memory of 1352 1536 xplorer.exe 34 PID 1536 wrote to memory of 1352 1536 xplorer.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe"C:\Users\Admin\AppData\Local\Temp\a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe"C:\Users\Admin\AppData\Local\Temp\a448d3517a18f7e76d1f3fb3cc3548c0d0e45ce275a26065d1d6676face57c3d.exe"2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GJVWE.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "xplorer" /t REG_SZ /d "C:\Windows\xplorer\xplorer.exe" /f4⤵
- Adds Run key to start application
PID:1256
-
-
-
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:828
-
-
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1352
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD54e6e99d38b1264af2b53a68c7cd6d648
SHA155ffe17732d1d9c539d702a1311ef9674fe7b3cf
SHA256168d9cdf4849fde3b4817db207e60934b6c877be439289f3fb3a4eb9e4326ff0
SHA512bde21abed1bfc3dbdd6afc83614aa27c3f33dfbb434e139523ac57ecd84875b0e96a241f5828eda0b055f787ec7f95850b0f4ab0ee752ac36484b2bfd78a859d
-
Filesize
160KB
MD5ea506c64469b609ced7d97027333bcc4
SHA11063d61e1a9001aa6a9b0e3585e9984ed402c550
SHA256ea0a25638742f60ee95898347ec5a033ddbe8393caf1806e0edfae04c0cbb5b0
SHA512deb3cd5fd4d20898d0233b90b3b3dca50f03c2e83816035c65e3e37ea34ebc63c07d3ed20877a95ad7079868edb04f3c723e729944ece311b0148310bcd26f93
-
Filesize
160KB
MD5ea506c64469b609ced7d97027333bcc4
SHA11063d61e1a9001aa6a9b0e3585e9984ed402c550
SHA256ea0a25638742f60ee95898347ec5a033ddbe8393caf1806e0edfae04c0cbb5b0
SHA512deb3cd5fd4d20898d0233b90b3b3dca50f03c2e83816035c65e3e37ea34ebc63c07d3ed20877a95ad7079868edb04f3c723e729944ece311b0148310bcd26f93
-
Filesize
160KB
MD5ea506c64469b609ced7d97027333bcc4
SHA11063d61e1a9001aa6a9b0e3585e9984ed402c550
SHA256ea0a25638742f60ee95898347ec5a033ddbe8393caf1806e0edfae04c0cbb5b0
SHA512deb3cd5fd4d20898d0233b90b3b3dca50f03c2e83816035c65e3e37ea34ebc63c07d3ed20877a95ad7079868edb04f3c723e729944ece311b0148310bcd26f93
-
Filesize
160KB
MD5ea506c64469b609ced7d97027333bcc4
SHA11063d61e1a9001aa6a9b0e3585e9984ed402c550
SHA256ea0a25638742f60ee95898347ec5a033ddbe8393caf1806e0edfae04c0cbb5b0
SHA512deb3cd5fd4d20898d0233b90b3b3dca50f03c2e83816035c65e3e37ea34ebc63c07d3ed20877a95ad7079868edb04f3c723e729944ece311b0148310bcd26f93
-
Filesize
160KB
MD5ea506c64469b609ced7d97027333bcc4
SHA11063d61e1a9001aa6a9b0e3585e9984ed402c550
SHA256ea0a25638742f60ee95898347ec5a033ddbe8393caf1806e0edfae04c0cbb5b0
SHA512deb3cd5fd4d20898d0233b90b3b3dca50f03c2e83816035c65e3e37ea34ebc63c07d3ed20877a95ad7079868edb04f3c723e729944ece311b0148310bcd26f93
-
Filesize
160KB
MD5ea506c64469b609ced7d97027333bcc4
SHA11063d61e1a9001aa6a9b0e3585e9984ed402c550
SHA256ea0a25638742f60ee95898347ec5a033ddbe8393caf1806e0edfae04c0cbb5b0
SHA512deb3cd5fd4d20898d0233b90b3b3dca50f03c2e83816035c65e3e37ea34ebc63c07d3ed20877a95ad7079868edb04f3c723e729944ece311b0148310bcd26f93
-
Filesize
160KB
MD5ea506c64469b609ced7d97027333bcc4
SHA11063d61e1a9001aa6a9b0e3585e9984ed402c550
SHA256ea0a25638742f60ee95898347ec5a033ddbe8393caf1806e0edfae04c0cbb5b0
SHA512deb3cd5fd4d20898d0233b90b3b3dca50f03c2e83816035c65e3e37ea34ebc63c07d3ed20877a95ad7079868edb04f3c723e729944ece311b0148310bcd26f93
-
Filesize
160KB
MD5ea506c64469b609ced7d97027333bcc4
SHA11063d61e1a9001aa6a9b0e3585e9984ed402c550
SHA256ea0a25638742f60ee95898347ec5a033ddbe8393caf1806e0edfae04c0cbb5b0
SHA512deb3cd5fd4d20898d0233b90b3b3dca50f03c2e83816035c65e3e37ea34ebc63c07d3ed20877a95ad7079868edb04f3c723e729944ece311b0148310bcd26f93