Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe
Resource
win7-20220812-en
General
-
Target
5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe
-
Size
1.1MB
-
MD5
c0472277dc8d80ecc9522a9d8fe734a0
-
SHA1
0047a28f9337e4404afde444919aaf08922c98d5
-
SHA256
5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e
-
SHA512
d040424304b431dccb46fb95e853ef318d32b8d0b0046d567860fff243cd3f60d41e6c6742001ed903d46aec681dadf9d05d8dde9d16242254b03444a4eb52e6
-
SSDEEP
24576:74lavt0LkLL9IMixoEgeaWwmRGgl5bWq9MmCS:Okwkn9IMHeaWwtU5KaPCS
Malware Config
Signatures
-
Processes:
5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe -
Executes dropped EXE 2 IoCs
Processes:
5411.exeihzy.exepid process 1240 5411.exe 956 ihzy.exe -
Loads dropped DLL 6 IoCs
Processes:
5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe5411.exepid process 1352 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe 1352 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe 1352 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe 1352 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe 1240 5411.exe 1240 5411.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ihzy.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\Currentversion\Run ihzy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\{1AD2B570-A67A-82D9-C582-9628DCEA168B} = "C:\\Users\\Admin\\AppData\\Roaming\\Anamev\\ihzy.exe" ihzy.exe -
Processes:
5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5411.exedescription pid process target process PID 1240 set thread context of 688 1240 5411.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
5411.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5411.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Privacy 5411.exe -
NTFS ADS 1 IoCs
Processes:
WinMail.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\761C2CFD-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
ihzy.exepid process 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe 956 ihzy.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
5411.exeWinMail.execmd.exedescription pid process Token: SeSecurityPrivilege 1240 5411.exe Token: SeSecurityPrivilege 1240 5411.exe Token: SeSecurityPrivilege 1240 5411.exe Token: SeManageVolumePrivilege 1804 WinMail.exe Token: SeSecurityPrivilege 688 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
WinMail.exepid process 1804 WinMail.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe5411.exeihzy.exedescription pid process target process PID 1352 wrote to memory of 1240 1352 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe 5411.exe PID 1352 wrote to memory of 1240 1352 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe 5411.exe PID 1352 wrote to memory of 1240 1352 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe 5411.exe PID 1352 wrote to memory of 1240 1352 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe 5411.exe PID 1240 wrote to memory of 956 1240 5411.exe ihzy.exe PID 1240 wrote to memory of 956 1240 5411.exe ihzy.exe PID 1240 wrote to memory of 956 1240 5411.exe ihzy.exe PID 1240 wrote to memory of 956 1240 5411.exe ihzy.exe PID 956 wrote to memory of 1112 956 ihzy.exe taskhost.exe PID 956 wrote to memory of 1112 956 ihzy.exe taskhost.exe PID 956 wrote to memory of 1112 956 ihzy.exe taskhost.exe PID 956 wrote to memory of 1112 956 ihzy.exe taskhost.exe PID 956 wrote to memory of 1112 956 ihzy.exe taskhost.exe PID 956 wrote to memory of 1172 956 ihzy.exe Dwm.exe PID 956 wrote to memory of 1172 956 ihzy.exe Dwm.exe PID 956 wrote to memory of 1172 956 ihzy.exe Dwm.exe PID 956 wrote to memory of 1172 956 ihzy.exe Dwm.exe PID 956 wrote to memory of 1172 956 ihzy.exe Dwm.exe PID 956 wrote to memory of 1212 956 ihzy.exe Explorer.EXE PID 956 wrote to memory of 1212 956 ihzy.exe Explorer.EXE PID 956 wrote to memory of 1212 956 ihzy.exe Explorer.EXE PID 956 wrote to memory of 1212 956 ihzy.exe Explorer.EXE PID 956 wrote to memory of 1212 956 ihzy.exe Explorer.EXE PID 956 wrote to memory of 1240 956 ihzy.exe 5411.exe PID 956 wrote to memory of 1240 956 ihzy.exe 5411.exe PID 956 wrote to memory of 1240 956 ihzy.exe 5411.exe PID 956 wrote to memory of 1240 956 ihzy.exe 5411.exe PID 956 wrote to memory of 1240 956 ihzy.exe 5411.exe PID 956 wrote to memory of 1804 956 ihzy.exe WinMail.exe PID 956 wrote to memory of 1804 956 ihzy.exe WinMail.exe PID 956 wrote to memory of 1804 956 ihzy.exe WinMail.exe PID 956 wrote to memory of 1804 956 ihzy.exe WinMail.exe PID 956 wrote to memory of 1804 956 ihzy.exe WinMail.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 1240 wrote to memory of 688 1240 5411.exe cmd.exe PID 956 wrote to memory of 1612 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 1612 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 1612 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 1612 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 1612 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 2040 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 2040 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 2040 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 2040 956 ihzy.exe DllHost.exe PID 956 wrote to memory of 2040 956 ihzy.exe DllHost.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe"C:\Users\Admin\AppData\Local\Temp\5b87c6f4f1f3e64668fdf3adaf30a0f184ee96e9676f36f15fbefb29052b467e.exe"2⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\5411\5411.exe"C:\Users\Admin\AppData\Local\Temp\5411\5411.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\Anamev\ihzy.exe"C:\Users\Admin\AppData\Roaming\Anamev\ihzy.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp96529b14.bat"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:688
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1112
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1804
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1612
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD58fe66c8815c6aa14bfff040adcec0933
SHA1c250b8254dd53555bdd59335c3039949ff595688
SHA256d5e886a0c5e2fd4549a1802e737d1865b820ed94e5352b61bde930733cf6a6bd
SHA512b3c9033722e767b406706c0715ef30858355ee41e6d1109c8715934c7b8733f1ad8c91f171e1bbaf729b0c4f1381799c9fb8cdffa59ff5b184478ba36f31c1c8
-
Filesize
138KB
MD59d4e6865b4d8d364dd60024d9a783ad6
SHA11c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14
SHA25601690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d
SHA512c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5
-
Filesize
138KB
MD59d4e6865b4d8d364dd60024d9a783ad6
SHA11c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14
SHA25601690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d
SHA512c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5
-
Filesize
197B
MD5ed5ce02fb5b7e2937c6a73cd378e42d8
SHA1f75868e55d1fc2aa30d102200c9492415a91d075
SHA2569575f30d2431c98c25c86aaed86a2fef7a91136f35f3754e3bd60ee8e267db64
SHA51278b5f6ff7faafce6f0b5c33d8568a294d0d2b2a2627860c3865bc40be3b21a017b8f185824a68a69370e0573676e70def60013698142c1d3310800372797d422
-
Filesize
138KB
MD512f8077ca1d5c87b29003d6475f0a753
SHA1fbac1757aceccccbbaede9c504c003bfd8e61d58
SHA25633bdcb5b40a0e02856997f1fd0c1334dcffcab807d911f3cca7009e2d4f8c4aa
SHA5122905f9f3249146c1786ca5def7a23d0648d05fc11473774df8bada09581cba71bdba503d21a51613d615d5dfd105a5c5fc37f069eab5cbe642270c7ded2a84bc
-
Filesize
138KB
MD512f8077ca1d5c87b29003d6475f0a753
SHA1fbac1757aceccccbbaede9c504c003bfd8e61d58
SHA25633bdcb5b40a0e02856997f1fd0c1334dcffcab807d911f3cca7009e2d4f8c4aa
SHA5122905f9f3249146c1786ca5def7a23d0648d05fc11473774df8bada09581cba71bdba503d21a51613d615d5dfd105a5c5fc37f069eab5cbe642270c7ded2a84bc
-
Filesize
343B
MD59613ebf0469a897a81233929877ad318
SHA11042a2d89455d1bafaf7949c042da5b5e97d371c
SHA2563ef1f682623fe8f7a249ccfe3bad576b6b1e1ae9558a09c6c20d4b6bbe69c09a
SHA512ae854477a5a471fd856418972b69f1486f91ee0b1d4809707fc34bde8b15d6fd7093f57e5a0518c310b71e1a9fcbf8a21729bf238facb4eb0c467f35245676ac
-
Filesize
138KB
MD59d4e6865b4d8d364dd60024d9a783ad6
SHA11c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14
SHA25601690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d
SHA512c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5
-
Filesize
138KB
MD59d4e6865b4d8d364dd60024d9a783ad6
SHA11c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14
SHA25601690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d
SHA512c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5
-
Filesize
138KB
MD59d4e6865b4d8d364dd60024d9a783ad6
SHA11c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14
SHA25601690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d
SHA512c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5
-
Filesize
138KB
MD59d4e6865b4d8d364dd60024d9a783ad6
SHA11c84bab1e7a83d56625e2ca6bd1bf7b7f3af4c14
SHA25601690a5fc6e51f72a8d7053d2ab8985ae894fd770212e82b32c5f4f74cdc577d
SHA512c6aa9672839cd6fa526ab3b29a3ac03e3574cc3a18da2916d0b9943a2f942a257f76f0ae854f5426d16a6485a761bf73e3033178deb5a6824a0c600897afd8f5
-
Filesize
138KB
MD512f8077ca1d5c87b29003d6475f0a753
SHA1fbac1757aceccccbbaede9c504c003bfd8e61d58
SHA25633bdcb5b40a0e02856997f1fd0c1334dcffcab807d911f3cca7009e2d4f8c4aa
SHA5122905f9f3249146c1786ca5def7a23d0648d05fc11473774df8bada09581cba71bdba503d21a51613d615d5dfd105a5c5fc37f069eab5cbe642270c7ded2a84bc
-
Filesize
138KB
MD512f8077ca1d5c87b29003d6475f0a753
SHA1fbac1757aceccccbbaede9c504c003bfd8e61d58
SHA25633bdcb5b40a0e02856997f1fd0c1334dcffcab807d911f3cca7009e2d4f8c4aa
SHA5122905f9f3249146c1786ca5def7a23d0648d05fc11473774df8bada09581cba71bdba503d21a51613d615d5dfd105a5c5fc37f069eab5cbe642270c7ded2a84bc