Analysis
-
max time kernel
186s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:39
Static task
static1
Behavioral task
behavioral1
Sample
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe
Resource
win10v2004-20220812-en
General
-
Target
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe
-
Size
49KB
-
MD5
66fccc97b5cbec264ae902e094182904
-
SHA1
ac57e923e4ed2438b72668477a0154edc2bde585
-
SHA256
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14
-
SHA512
10ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259
-
SSDEEP
768:eokswQQnAQ/rZSwk5ALCdB2DWG+qkCW78Yni1XH3XJzdqWPZBuUYIKsZEYbo7A:9kswQDYrZo5isPqo78fXJzgW5pxk7A
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
appdomain.exesychost.exepid process 464 appdomain.exe 640 sychost.exe -
Loads dropped DLL 3 IoCs
Processes:
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exeappdomain.exepid process 576 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe 576 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe 464 appdomain.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
appdomain.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce appdomain.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\WindowsNT = "\"C:\\Users\\Admin\\AppData\\Roaming\\sychost\\appdomain.exe\"" appdomain.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_1 \Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\sychost\appdomain.exe nsis_installer_2 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exepid process 576 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exeappdomain.exedescription pid process target process PID 576 wrote to memory of 464 576 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe appdomain.exe PID 576 wrote to memory of 464 576 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe appdomain.exe PID 576 wrote to memory of 464 576 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe appdomain.exe PID 576 wrote to memory of 464 576 1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe appdomain.exe PID 464 wrote to memory of 640 464 appdomain.exe sychost.exe PID 464 wrote to memory of 640 464 appdomain.exe sychost.exe PID 464 wrote to memory of 640 464 appdomain.exe sychost.exe PID 464 wrote to memory of 640 464 appdomain.exe sychost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe"C:\Users\Admin\AppData\Local\Temp\1faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Roaming\sychost\appdomain.exeC:\Users\Admin\AppData\Roaming\sychost\appdomain.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Roaming\sychost\sychost.exeC:\Users\Admin\AppData\Roaming\sychost\sychost.exe3⤵
- Executes dropped EXE
PID:640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD566fccc97b5cbec264ae902e094182904
SHA1ac57e923e4ed2438b72668477a0154edc2bde585
SHA2561faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14
SHA51210ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259
-
Filesize
49KB
MD566fccc97b5cbec264ae902e094182904
SHA1ac57e923e4ed2438b72668477a0154edc2bde585
SHA2561faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14
SHA51210ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4
-
Filesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
Filesize
49KB
MD566fccc97b5cbec264ae902e094182904
SHA1ac57e923e4ed2438b72668477a0154edc2bde585
SHA2561faa89ad631094bf3b37483c113acd75d62a6db6574a32e10d7b3c2625370d14
SHA51210ff43178c3229dd783fc72c770400316b9d0ca7c9f380cc3e8da6142d8c6a04fd13514b6e5ef03592afec27ebc3f9ecac67e587475e14505c2356d2d5cc6259
-
Filesize
24KB
MD5a45321be660b0dbd93d6a2ea208f19bb
SHA104925aaee56724371ea040b223ed93a1b38b1c26
SHA256aa386226477f774b085328b1c01ced9e8edc208d97fa1a85f6e1f4abbf1c0f38
SHA512c9ddd12a1695fee4d3ff93e476fa940556d91ab41f41ee6fd88cc5949543c443f745590a7a79354723880ec6a6c3a2ce10c2f61fedabfe79f6b8707b22d963e4