Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:43

General

  • Target

    ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe

  • Size

    1.2MB

  • MD5

    38df01b430a44e714e2872cb069dbb9c

  • SHA1

    7593a65f30da17196b2c6abe94902271dbe78063

  • SHA256

    ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9

  • SHA512

    5cff7614117cc68bd77104a57723b85d3875d98708039149f57eef7392e88bd1c2881a4892510768c72d0ffcdab515b4db9dd553b5e59152ba783c9945a4828c

  • SSDEEP

    24576:Gt24QdLl+X+2FHARUBZQqE/aoepkbAy2945mynFz9VRQYQavcMj:M+g1TZQRanpry2jynFzPRQYQavco

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 13 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe
        "C:\Users\Admin\AppData\Local\Temp\ef734aafa5d4712a8eecdd7b63ba895fe6869c221acbd9038e65a472426d78d9.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Users\Admin\AppData\Roaming\SHH\SHH.exe
          "C:\Users\Admin\AppData\Roaming\SHH\SHH.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:428
          • C:\Users\Admin\AppData\Roaming\SHH\SHH.exe
            "C:\Users\Admin\AppData\Roaming\SHH\SHH.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1868
            • C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe
              "C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1672
              • C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe
                "C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe"
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:824
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa04a7cf1.bat"
              5⤵
                PID:2016
      • C:\Windows\system32\Dwm.exe
        "C:\Windows\system32\Dwm.exe"
        1⤵
          PID:1180
        • C:\Windows\system32\taskhost.exe
          "taskhost.exe"
          1⤵
            PID:1108
          • C:\Windows\system32\conhost.exe
            \??\C:\Windows\system32\conhost.exe "1313365611-1528495214-8558354851224061559-350407202-898501066618566701-1323309128"
            1⤵
              PID:896
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:276
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                  PID:524

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\tmpa04a7cf1.bat

                  Filesize

                  187B

                  MD5

                  6d706f8edaddba18374c5f5fdb76660a

                  SHA1

                  17f67587536c01c661ccede522f70b287a653983

                  SHA256

                  2bffd42d55702bdd516a3b3ecad9deaee79452939b19e867622799639f2a4df1

                  SHA512

                  8fffc9e511469e0bf736d23aa4d7456e4b1dc00682119690dc4f9663efa4708ebf7fe59e93d609b7790b48a641619f0866f2521cc1ec1a384b2b3f9876eeaf21

                • C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe

                  Filesize

                  1.1MB

                  MD5

                  25f03aefacbeee415d381bf8dbd6f44c

                  SHA1

                  e31266ab52d073790095c970e77b9ce556723c1c

                  SHA256

                  aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2

                  SHA512

                  16349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33

                • C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe

                  Filesize

                  1.1MB

                  MD5

                  25f03aefacbeee415d381bf8dbd6f44c

                  SHA1

                  e31266ab52d073790095c970e77b9ce556723c1c

                  SHA256

                  aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2

                  SHA512

                  16349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33

                • C:\Users\Admin\AppData\Roaming\Lyeky\veim.exe

                  Filesize

                  1.1MB

                  MD5

                  25f03aefacbeee415d381bf8dbd6f44c

                  SHA1

                  e31266ab52d073790095c970e77b9ce556723c1c

                  SHA256

                  aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2

                  SHA512

                  16349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33

                • C:\Users\Admin\AppData\Roaming\SHH\SHH

                  Filesize

                  138KB

                  MD5

                  e3ca3a7fad60c185f16afc3f7b370e26

                  SHA1

                  8ffb08ed5e9c8b55c578289129f96aafa2f6e9d6

                  SHA256

                  c8330918df1d31793e8d59869a775fd276602a2397717e958ce60b1ed538dfa3

                  SHA512

                  5737a1c4dc86e55d70497849f679bea554e0b835076c625d98eae3151995e06a387c199233a21b80a049a0011f2a101d0e2c2f9b27ee6c44a7eb44aefce45a76

                • C:\Users\Admin\AppData\Roaming\SHH\SHH.exe

                  Filesize

                  1.1MB

                  MD5

                  82d3426d9da06a897ad3dae2893ee461

                  SHA1

                  4e9f8084633463dd8e2dd33d499dda329f88225e

                  SHA256

                  a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd

                  SHA512

                  32642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04

                • C:\Users\Admin\AppData\Roaming\SHH\SHH.exe

                  Filesize

                  1.1MB

                  MD5

                  82d3426d9da06a897ad3dae2893ee461

                  SHA1

                  4e9f8084633463dd8e2dd33d499dda329f88225e

                  SHA256

                  a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd

                  SHA512

                  32642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04

                • C:\Users\Admin\AppData\Roaming\SHH\SHH.exe

                  Filesize

                  1.1MB

                  MD5

                  82d3426d9da06a897ad3dae2893ee461

                  SHA1

                  4e9f8084633463dd8e2dd33d499dda329f88225e

                  SHA256

                  a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd

                  SHA512

                  32642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04

                • \Users\Admin\AppData\Roaming\Lyeky\veim.exe

                  Filesize

                  1.1MB

                  MD5

                  25f03aefacbeee415d381bf8dbd6f44c

                  SHA1

                  e31266ab52d073790095c970e77b9ce556723c1c

                  SHA256

                  aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2

                  SHA512

                  16349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33

                • \Users\Admin\AppData\Roaming\Lyeky\veim.exe

                  Filesize

                  1.1MB

                  MD5

                  25f03aefacbeee415d381bf8dbd6f44c

                  SHA1

                  e31266ab52d073790095c970e77b9ce556723c1c

                  SHA256

                  aa23166dea5665a13887f5247a4d6977dc7772f14e571c22c4b62b5bb0cb9ab2

                  SHA512

                  16349b9d772ab5ee4c558ba8445fb196490c4c31dd0c5982ba9d31bbfbae10e91c6b1bf0be8fd90f16e4f11c303e408c7c848ba4572fd893bece03564b712c33

                • \Users\Admin\AppData\Roaming\SHH\SHH.exe

                  Filesize

                  1.1MB

                  MD5

                  82d3426d9da06a897ad3dae2893ee461

                  SHA1

                  4e9f8084633463dd8e2dd33d499dda329f88225e

                  SHA256

                  a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd

                  SHA512

                  32642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04

                • \Users\Admin\AppData\Roaming\SHH\SHH.exe

                  Filesize

                  1.1MB

                  MD5

                  82d3426d9da06a897ad3dae2893ee461

                  SHA1

                  4e9f8084633463dd8e2dd33d499dda329f88225e

                  SHA256

                  a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd

                  SHA512

                  32642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04

                • \Users\Admin\AppData\Roaming\SHH\SHH.exe

                  Filesize

                  1.1MB

                  MD5

                  82d3426d9da06a897ad3dae2893ee461

                  SHA1

                  4e9f8084633463dd8e2dd33d499dda329f88225e

                  SHA256

                  a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd

                  SHA512

                  32642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04

                • \Users\Admin\AppData\Roaming\SHH\SHH.exe

                  Filesize

                  1.1MB

                  MD5

                  82d3426d9da06a897ad3dae2893ee461

                  SHA1

                  4e9f8084633463dd8e2dd33d499dda329f88225e

                  SHA256

                  a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd

                  SHA512

                  32642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04

                • \Users\Admin\AppData\Roaming\SHH\SHH.exe

                  Filesize

                  1.1MB

                  MD5

                  82d3426d9da06a897ad3dae2893ee461

                  SHA1

                  4e9f8084633463dd8e2dd33d499dda329f88225e

                  SHA256

                  a04a1d62bb232c5e2b79f94116000ca237f28457f413304a00ce47b851dc3bfd

                  SHA512

                  32642a9dbc2eb63313204892812378ef17fb27e76347e0e06e1214ac136ca254db5ab1cb8aae377801aa645145ec86d9b8762350f87d3bca8c789f74cd8d3b04

                • memory/276-127-0x0000000000290000-0x00000000002B7000-memory.dmp

                  Filesize

                  156KB

                • memory/276-128-0x0000000000290000-0x00000000002B7000-memory.dmp

                  Filesize

                  156KB

                • memory/276-129-0x0000000000290000-0x00000000002B7000-memory.dmp

                  Filesize

                  156KB

                • memory/276-130-0x0000000000290000-0x00000000002B7000-memory.dmp

                  Filesize

                  156KB

                • memory/428-59-0x0000000000000000-mapping.dmp

                • memory/524-133-0x00000000028F0000-0x0000000002917000-memory.dmp

                  Filesize

                  156KB

                • memory/524-135-0x00000000028F0000-0x0000000002917000-memory.dmp

                  Filesize

                  156KB

                • memory/524-136-0x00000000028F0000-0x0000000002917000-memory.dmp

                  Filesize

                  156KB

                • memory/524-134-0x00000000028F0000-0x0000000002917000-memory.dmp

                  Filesize

                  156KB

                • memory/824-124-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/824-91-0x0000000000413048-mapping.dmp

                • memory/1032-54-0x0000000076711000-0x0000000076713000-memory.dmp

                  Filesize

                  8KB

                • memory/1108-98-0x0000000000310000-0x0000000000337000-memory.dmp

                  Filesize

                  156KB

                • memory/1108-99-0x0000000000310000-0x0000000000337000-memory.dmp

                  Filesize

                  156KB

                • memory/1108-100-0x0000000000310000-0x0000000000337000-memory.dmp

                  Filesize

                  156KB

                • memory/1108-97-0x0000000000310000-0x0000000000337000-memory.dmp

                  Filesize

                  156KB

                • memory/1180-103-0x00000000002A0000-0x00000000002C7000-memory.dmp

                  Filesize

                  156KB

                • memory/1180-104-0x00000000002A0000-0x00000000002C7000-memory.dmp

                  Filesize

                  156KB

                • memory/1180-105-0x00000000002A0000-0x00000000002C7000-memory.dmp

                  Filesize

                  156KB

                • memory/1180-106-0x00000000002A0000-0x00000000002C7000-memory.dmp

                  Filesize

                  156KB

                • memory/1232-113-0x0000000002950000-0x0000000002977000-memory.dmp

                  Filesize

                  156KB

                • memory/1232-111-0x0000000002950000-0x0000000002977000-memory.dmp

                  Filesize

                  156KB

                • memory/1232-114-0x0000000002950000-0x0000000002977000-memory.dmp

                  Filesize

                  156KB

                • memory/1232-109-0x0000000002950000-0x0000000002977000-memory.dmp

                  Filesize

                  156KB

                • memory/1672-79-0x0000000000000000-mapping.dmp

                • memory/1868-72-0x0000000000413048-mapping.dmp

                • memory/1868-69-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1868-65-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1868-66-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1868-68-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1868-112-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1868-77-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1868-76-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/1868-71-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/2016-118-0x0000000000100000-0x0000000000127000-memory.dmp

                  Filesize

                  156KB

                • memory/2016-117-0x0000000000100000-0x0000000000127000-memory.dmp

                  Filesize

                  156KB

                • memory/2016-120-0x0000000000100000-0x0000000000127000-memory.dmp

                  Filesize

                  156KB

                • memory/2016-119-0x0000000000100000-0x0000000000127000-memory.dmp

                  Filesize

                  156KB

                • memory/2016-110-0x0000000000000000-mapping.dmp