Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:43

General

  • Target

    5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe

  • Size

    1.1MB

  • MD5

    c0472277dc8d80ecc9522a9d8fe734a0

  • SHA1

    0047a28f9337e4404afde444919aaf08922c98d5

  • SHA256

    5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e

  • SHA512

    d040424304b431dccb46fb95e853ef318d32b8d0b0046d567860fff243cd3f60d41e6c6742001ed903d46aec681dadf9d05d8dde9d16242254b03444a4eb52e6

  • SSDEEP

    24576:74lavt0LkLL9IMixoEgeaWwmRGgl5bWq9MmCS:Okwkn9IMHeaWwtU5KaPCS

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe
        "C:\Users\Admin\AppData\Local\Temp\5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe"
        2⤵
        • UAC bypass
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1352
        • C:\Users\Admin\AppData\Local\Temp\5411\5411.exe
          "C:\Users\Admin\AppData\Local\Temp\5411\5411.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1240
          • C:\Users\Admin\AppData\Roaming\Anamev\ihzy.exe
            "C:\Users\Admin\AppData\Roaming\Anamev\ihzy.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:956
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp96529b14.bat"
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:688
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1172
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1112
        • C:\Program Files\Windows Mail\WinMail.exe
          "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
          1⤵
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1804
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
          1⤵
            PID:1612
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            1⤵
              PID:2040

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              340B

              MD5

              8fe66c8815c6aa14bfff040adcec0933

              SHA1

              c250b8254dd53555bdd59335c3039949ff595688

              SHA256

              d5e886a0c5e2fd4549a1802e737d1865b820ed94e5352b61bde930733cf6a6bd

              SHA512

              b3c9033722e767b406706c0715ef30858355ee41e6d1109c8715934c7b8733f1ad8c91f171e1bbaf729b0c4f1381799c9fb8cdffa59ff5b184478ba36f31c1c8

            • C:\Users\Admin\AppData\Local\Temp\5411\5411.exe

              Filesize

              138KB

              MD5

              9d4e6865b4d8d364dd60024d9a783ad6

              SHA1

              1c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14

              SHA256

              01690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d

              SHA512

              c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5

            • C:\Users\Admin\AppData\Local\Temp\5411\5411.exe

              Filesize

              138KB

              MD5

              9d4e6865b4d8d364dd60024d9a783ad6

              SHA1

              1c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14

              SHA256

              01690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d

              SHA512

              c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5

            • C:\Users\Admin\AppData\Local\Temp\tmp96529b14.bat

              Filesize

              197B

              MD5

              ed5ce02fb5b7e2937c6a73cd378e42d8

              SHA1

              f75868e55d1fc2aa30d102200c9492415a91d075

              SHA256

              9575f30d2431c98c25c86aaed86a2fef7a91136f35f3754e3bd60ee8e267db64

              SHA512

              78b5f6ff7faafce6f0b5c33d8568a294d0d2b2a2627860c3865bc40be3b21a017b8f185824a68a69370e0573676e70def60013698142c1d3310800372797d422

            • C:\Users\Admin\AppData\Roaming\Anamev\ihzy.exe

              Filesize

              138KB

              MD5

              12f8077ca1d5c87b29003d6475f0a753

              SHA1

              fbac1757aceccccbbaede9c504c003bfd8e61d58

              SHA256

              33bdcb5b40a0e02856997f1fd0c1334dcffcab807d911f3cca7009e2d4f8c4aa

              SHA512

              2905f9f3249146c1786ca5def7a23d0648d05fc11473774df8bada09581cba71bdba503d21a51613d615d5dfd105a5c5fc37f069eab5cbe642270c7ded2a84bc

            • C:\Users\Admin\AppData\Roaming\Anamev\ihzy.exe

              Filesize

              138KB

              MD5

              12f8077ca1d5c87b29003d6475f0a753

              SHA1

              fbac1757aceccccbbaede9c504c003bfd8e61d58

              SHA256

              33bdcb5b40a0e02856997f1fd0c1334dcffcab807d911f3cca7009e2d4f8c4aa

              SHA512

              2905f9f3249146c1786ca5def7a23d0648d05fc11473774df8bada09581cba71bdba503d21a51613d615d5dfd105a5c5fc37f069eab5cbe642270c7ded2a84bc

            • C:\Users\Admin\AppData\Roaming\Hedoz\ezfi.avi

              Filesize

              343B

              MD5

              9613ebf0469a897a81233929877ad318

              SHA1

              1042a2d89455d1bafaf7949c042da5b5e97d371c

              SHA256

              3ef1f682623fe8f7a249ccfe3bad576b6b1e1ae9558a09c6c20d4b6bbe69c09a

              SHA512

              ae854477a5a471fd856418972b69f1486f91ee0b1d4809707fc34bde8b15d6fd7093f57e5a0518c310b71e1a9fcbf8a21729bf238facb4eb0c467f35245676ac

            • \Users\Admin\AppData\Local\Temp\5411\5411.exe

              Filesize

              138KB

              MD5

              9d4e6865b4d8d364dd60024d9a783ad6

              SHA1

              1c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14

              SHA256

              01690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d

              SHA512

              c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5

            • \Users\Admin\AppData\Local\Temp\5411\5411.exe

              Filesize

              138KB

              MD5

              9d4e6865b4d8d364dd60024d9a783ad6

              SHA1

              1c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14

              SHA256

              01690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d

              SHA512

              c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5

            • \Users\Admin\AppData\Local\Temp\5411\5411.exe

              Filesize

              138KB

              MD5

              9d4e6865b4d8d364dd60024d9a783ad6

              SHA1

              1c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14

              SHA256

              01690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d

              SHA512

              c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5

            • \Users\Admin\AppData\Local\Temp\5411\5411.exe

              Filesize

              138KB

              MD5

              9d4e6865b4d8d364dd60024d9a783ad6

              SHA1

              1c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14

              SHA256

              01690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d

              SHA512

              c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5

            • \Users\Admin\AppData\Roaming\Anamev\ihzy.exe

              Filesize

              138KB

              MD5

              12f8077ca1d5c87b29003d6475f0a753

              SHA1

              fbac1757aceccccbbaede9c504c003bfd8e61d58

              SHA256

              33bdcb5b40a0e02856997f1fd0c1334dcffcab807d911f3cca7009e2d4f8c4aa

              SHA512

              2905f9f3249146c1786ca5def7a23d0648d05fc11473774df8bada09581cba71bdba503d21a51613d615d5dfd105a5c5fc37f069eab5cbe642270c7ded2a84bc

            • \Users\Admin\AppData\Roaming\Anamev\ihzy.exe

              Filesize

              138KB

              MD5

              12f8077ca1d5c87b29003d6475f0a753

              SHA1

              fbac1757aceccccbbaede9c504c003bfd8e61d58

              SHA256

              33bdcb5b40a0e02856997f1fd0c1334dcffcab807d911f3cca7009e2d4f8c4aa

              SHA512

              2905f9f3249146c1786ca5def7a23d0648d05fc11473774df8bada09581cba71bdba503d21a51613d615d5dfd105a5c5fc37f069eab5cbe642270c7ded2a84bc

            • memory/688-122-0x0000000000062CBA-mapping.dmp

            • memory/688-124-0x0000000000050000-0x0000000000077000-memory.dmp

              Filesize

              156KB

            • memory/688-117-0x0000000000050000-0x0000000000077000-memory.dmp

              Filesize

              156KB

            • memory/688-121-0x0000000000050000-0x0000000000077000-memory.dmp

              Filesize

              156KB

            • memory/688-120-0x0000000000050000-0x0000000000077000-memory.dmp

              Filesize

              156KB

            • memory/688-119-0x0000000000050000-0x0000000000077000-memory.dmp

              Filesize

              156KB

            • memory/956-65-0x0000000000000000-mapping.dmp

            • memory/1112-69-0x00000000001A0000-0x00000000001C7000-memory.dmp

              Filesize

              156KB

            • memory/1112-73-0x00000000001A0000-0x00000000001C7000-memory.dmp

              Filesize

              156KB

            • memory/1112-74-0x00000000001A0000-0x00000000001C7000-memory.dmp

              Filesize

              156KB

            • memory/1112-72-0x00000000001A0000-0x00000000001C7000-memory.dmp

              Filesize

              156KB

            • memory/1112-71-0x00000000001A0000-0x00000000001C7000-memory.dmp

              Filesize

              156KB

            • memory/1172-78-0x0000000000220000-0x0000000000247000-memory.dmp

              Filesize

              156KB

            • memory/1172-77-0x0000000000220000-0x0000000000247000-memory.dmp

              Filesize

              156KB

            • memory/1172-79-0x0000000000220000-0x0000000000247000-memory.dmp

              Filesize

              156KB

            • memory/1172-80-0x0000000000220000-0x0000000000247000-memory.dmp

              Filesize

              156KB

            • memory/1212-85-0x00000000029C0000-0x00000000029E7000-memory.dmp

              Filesize

              156KB

            • memory/1212-86-0x00000000029C0000-0x00000000029E7000-memory.dmp

              Filesize

              156KB

            • memory/1212-84-0x00000000029C0000-0x00000000029E7000-memory.dmp

              Filesize

              156KB

            • memory/1212-83-0x00000000029C0000-0x00000000029E7000-memory.dmp

              Filesize

              156KB

            • memory/1240-89-0x00000000002F0000-0x0000000000317000-memory.dmp

              Filesize

              156KB

            • memory/1240-92-0x00000000002F0000-0x0000000000317000-memory.dmp

              Filesize

              156KB

            • memory/1240-107-0x00000000002F0000-0x0000000000317000-memory.dmp

              Filesize

              156KB

            • memory/1240-59-0x0000000000000000-mapping.dmp

            • memory/1240-91-0x00000000002F0000-0x0000000000317000-memory.dmp

              Filesize

              156KB

            • memory/1240-90-0x00000000002F0000-0x0000000000317000-memory.dmp

              Filesize

              156KB

            • memory/1352-54-0x0000000075601000-0x0000000075603000-memory.dmp

              Filesize

              8KB

            • memory/1612-132-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/1612-131-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/1612-130-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/1612-129-0x0000000000120000-0x0000000000147000-memory.dmp

              Filesize

              156KB

            • memory/1804-113-0x0000000004130000-0x0000000004157000-memory.dmp

              Filesize

              156KB

            • memory/1804-93-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

              Filesize

              8KB

            • memory/1804-94-0x000007FEF60A1000-0x000007FEF60A3000-memory.dmp

              Filesize

              8KB

            • memory/1804-95-0x0000000002340000-0x0000000002350000-memory.dmp

              Filesize

              64KB

            • memory/1804-101-0x00000000023A0000-0x00000000023B0000-memory.dmp

              Filesize

              64KB

            • memory/1804-112-0x0000000004130000-0x0000000004157000-memory.dmp

              Filesize

              156KB

            • memory/1804-111-0x0000000004130000-0x0000000004157000-memory.dmp

              Filesize

              156KB

            • memory/1804-110-0x0000000004130000-0x0000000004157000-memory.dmp

              Filesize

              156KB

            • memory/2040-135-0x0000000003C50000-0x0000000003C77000-memory.dmp

              Filesize

              156KB