Analysis
-
max time kernel
175s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 21:02
Static task
static1
Behavioral task
behavioral1
Sample
36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe
Resource
win10v2004-20221111-en
General
-
Target
36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe
-
Size
761KB
-
MD5
0bbbe39130aa0cfdcc59fbafb00ea6c9
-
SHA1
d1ce34e3002e896a5b672f8ddb2dba6856abf292
-
SHA256
36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c
-
SHA512
43018d5e9f4f61a025aba8f53bff0ff4d8995bd71d75709b29edca4da65d91833761491718001efe87a48ee04bd625da2ddc1583e525a343171d0fadb0843a7f
-
SSDEEP
12288:5at0EAH49n8Bk8/MmCfj2U8D+Foc1xu93NoG/+d5Wel666rnyCaeu/HHxI:It24Hm0j2UToc1xuzoVF58KG
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
YVvj.comdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" YVvj.com -
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/820-73-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
YVvj.compid process 1436 YVvj.com -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
RegSvcs.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12P2BG56-3215-R276-57DQ-60078P63YXLA} RegSvcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12P2BG56-3215-R276-57DQ-60078P63YXLA}\StubPath = "\"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegSvcs.exe\"" RegSvcs.exe -
Loads dropped DLL 4 IoCs
Processes:
36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exepid process 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
YVvj.comRegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\94o3h6f = "C:\\Users\\Admin\\94o3h6f\\15756.vbs" YVvj.com Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ RegSvcs.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\RegSvcs.exe" RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce YVvj.com -
Processes:
YVvj.comdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA YVvj.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
YVvj.comdescription pid process target process PID 1436 set thread context of 820 1436 YVvj.com RegSvcs.exe -
Drops file in Windows directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
YVvj.compid process 1436 YVvj.com -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exeYVvj.comdescription pid process target process PID 956 wrote to memory of 1436 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe YVvj.com PID 956 wrote to memory of 1436 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe YVvj.com PID 956 wrote to memory of 1436 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe YVvj.com PID 956 wrote to memory of 1436 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe YVvj.com PID 956 wrote to memory of 1436 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe YVvj.com PID 956 wrote to memory of 1436 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe YVvj.com PID 956 wrote to memory of 1436 956 36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe YVvj.com PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe PID 1436 wrote to memory of 820 1436 YVvj.com RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe"C:\Users\Admin\AppData\Local\Temp\36255768ea0e742455a1146fdffe10c83de7cf69c1c4d7f9cae763ac6df4293c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\94o3h6f\YVvj.com"C:\Users\Admin\94o3h6f\YVvj.com" oIWDyDjVJm.JNE2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\94o3h6f\BYUMPM~1.MEEFilesize
68KB
MD5ae190882f58dcba2f9f5dd516d8a9f69
SHA1e4a31b222ad28f840085272519ae511a507438e5
SHA256f08a9185e65a640c0d7d2831a5adb55abb76d225a8899f581a8dc37a3ee2d3ad
SHA51216153677521cf84c0e83f513268cb0569498284d2a78864f48b3ba7452fc837237f224ddd19ad81fdcba8b1ee3c3f77a69c0d6f11f759022c61d05db8f8cc862
-
C:\Users\Admin\94o3h6f\IKkSpo.QLQFilesize
112B
MD59cfe5a9a7b071c1d705a94fac1c2e012
SHA145c3420d2c96730edb331ba9173319b62889481f
SHA25650478e8b1cf43c9e42bf27a59c2c402aa1b283d6dca7aec1e6a8c59055b3dc7d
SHA5127ce9bdf25e26d0f5930befbb24504df42ed12bb24f46a65ab5065f5c2e16e400923e4292ce072dd8b843e820caa5734bb09d6aa3281089540af84f273c64b33e
-
C:\Users\Admin\94o3h6f\YVvj.comFilesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
C:\Users\Admin\94o3h6f\oIWDyDjVJm.JNEFilesize
31.2MB
MD56bcdb465d6e2bc86fed1188fbc6d08a3
SHA19de7fe25187b3057493154a45d57d5a28a9f55ca
SHA256717f302f40ecbb9ed340e52f8f70b02eeb64acc3337d39dccab32a4c0b10e338
SHA512305b137395e71e0f118e8112e70371c0483077644cdbb59f5e85a4877d1e04db361b3d1cfe163654667af157197b1e75c41c2ab44f5c6a2c48fbf5d5ff5f3150
-
\Users\Admin\94o3h6f\YVvj.comFilesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
\Users\Admin\94o3h6f\YVvj.comFilesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
\Users\Admin\94o3h6f\YVvj.comFilesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
\Users\Admin\94o3h6f\YVvj.comFilesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
memory/820-65-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/820-67-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/820-68-0x0000000000401F8F-mapping.dmp
-
memory/820-71-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/820-73-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/956-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB
-
memory/1436-59-0x0000000000000000-mapping.dmp