Analysis
-
max time kernel
100s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:09
Static task
static1
Behavioral task
behavioral1
Sample
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe
Resource
win10v2004-20221111-en
General
-
Target
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe
-
Size
186KB
-
MD5
672fe820b80e57830884bd719175e49d
-
SHA1
d6f8a311d91ae0a9af6f1042c088240f32867743
-
SHA256
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b
-
SHA512
6ed3deaff6ed4f9b4a49ac32457301c8e86691d38ffee7319e9d02cb6f4be8c0a7c153811621d88fec236b9559c6407b0b5a7c0615ed159234812d1761b117c8
-
SSDEEP
3072:dPwYi9DaW25hmcq+vLQmllkdzKZrPfPyuCnENXmTxuVKWILdyR/9vNG8q+hrC7c4:dPwt1aW8hmc5D4FePfPytgmE4WQK9VqJ
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe -
Executes dropped EXE 1 IoCs
Processes:
dplaysvr.exepid process 1176 dplaysvr.exe -
Loads dropped DLL 3 IoCs
Processes:
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exedplaysvr.exepid process 972 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe 972 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe 1176 dplaysvr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\dplaysvr = "C:\\Users\\Admin\\AppData\\Local\\dplaysvr.exe" 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
dplaysvr.exepid process 1176 dplaysvr.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exedplaysvr.exepid process 972 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe 1176 dplaysvr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exedescription pid process target process PID 972 wrote to memory of 1176 972 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe dplaysvr.exe PID 972 wrote to memory of 1176 972 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe dplaysvr.exe PID 972 wrote to memory of 1176 972 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe dplaysvr.exe PID 972 wrote to memory of 1176 972 9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe dplaysvr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe"C:\Users\Admin\AppData\Local\Temp\9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\dplaysvr.exe"C:\Users\Admin\AppData\Local\dplaysvr.exe" C:\Users\Admin\AppData\Local\Temp\9b6dbaa324c0286b4c5fa0cfcbc21678a2c0137d3f32a11eab04b19cedf4240b.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:1176
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}1⤵PID:1492
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD518dbd0f48b606008da2b6d19015cb0f4
SHA170637b9d26e63cc4a8f01ab0b6111608cad59c60
SHA2563e29ed22d397fd92e0060585e6afe4f10ce75f83646ece987ec9f7c8f609b6db
SHA512944a354416abb6e02381f9ba0dbe5ab33f8dc333df2a7b67cc7390ea83cf85a9a64d6d47418dacc50946273c1e013494f01d25da2a92e29ea922a70fec893692
-
Filesize
40KB
MD5cf03fc3c2e01d86556cd1b5db9c3422b
SHA1c060405c276a4da29bada7479410e6d239f80fb1
SHA2568605e50aabd334bba51fc91993e8c477f78d47787a3000abc03f7faf360b6042
SHA512d06a85cb831ed9954c471c4248cc03a97b4a4dc76dbd11974094a700c69a5cc8436d9544a5129b882397936325b2ceeaff0615fe82481acd1e3d5ae95c2b61c3
-
Filesize
60KB
MD518dbd0f48b606008da2b6d19015cb0f4
SHA170637b9d26e63cc4a8f01ab0b6111608cad59c60
SHA2563e29ed22d397fd92e0060585e6afe4f10ce75f83646ece987ec9f7c8f609b6db
SHA512944a354416abb6e02381f9ba0dbe5ab33f8dc333df2a7b67cc7390ea83cf85a9a64d6d47418dacc50946273c1e013494f01d25da2a92e29ea922a70fec893692
-
Filesize
60KB
MD518dbd0f48b606008da2b6d19015cb0f4
SHA170637b9d26e63cc4a8f01ab0b6111608cad59c60
SHA2563e29ed22d397fd92e0060585e6afe4f10ce75f83646ece987ec9f7c8f609b6db
SHA512944a354416abb6e02381f9ba0dbe5ab33f8dc333df2a7b67cc7390ea83cf85a9a64d6d47418dacc50946273c1e013494f01d25da2a92e29ea922a70fec893692
-
Filesize
40KB
MD5cf03fc3c2e01d86556cd1b5db9c3422b
SHA1c060405c276a4da29bada7479410e6d239f80fb1
SHA2568605e50aabd334bba51fc91993e8c477f78d47787a3000abc03f7faf360b6042
SHA512d06a85cb831ed9954c471c4248cc03a97b4a4dc76dbd11974094a700c69a5cc8436d9544a5129b882397936325b2ceeaff0615fe82481acd1e3d5ae95c2b61c3
-
Filesize
60KB
MD518dbd0f48b606008da2b6d19015cb0f4
SHA170637b9d26e63cc4a8f01ab0b6111608cad59c60
SHA2563e29ed22d397fd92e0060585e6afe4f10ce75f83646ece987ec9f7c8f609b6db
SHA512944a354416abb6e02381f9ba0dbe5ab33f8dc333df2a7b67cc7390ea83cf85a9a64d6d47418dacc50946273c1e013494f01d25da2a92e29ea922a70fec893692
-
Filesize
60KB
MD518dbd0f48b606008da2b6d19015cb0f4
SHA170637b9d26e63cc4a8f01ab0b6111608cad59c60
SHA2563e29ed22d397fd92e0060585e6afe4f10ce75f83646ece987ec9f7c8f609b6db
SHA512944a354416abb6e02381f9ba0dbe5ab33f8dc333df2a7b67cc7390ea83cf85a9a64d6d47418dacc50946273c1e013494f01d25da2a92e29ea922a70fec893692
-
Filesize
40KB
MD5cf03fc3c2e01d86556cd1b5db9c3422b
SHA1c060405c276a4da29bada7479410e6d239f80fb1
SHA2568605e50aabd334bba51fc91993e8c477f78d47787a3000abc03f7faf360b6042
SHA512d06a85cb831ed9954c471c4248cc03a97b4a4dc76dbd11974094a700c69a5cc8436d9544a5129b882397936325b2ceeaff0615fe82481acd1e3d5ae95c2b61c3