Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:48
Static task
static1
Behavioral task
behavioral1
Sample
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe
Resource
win10v2004-20220812-en
General
-
Target
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe
-
Size
134KB
-
MD5
eeaf2bb4f5d50d890fb3f09513e461d4
-
SHA1
2cd23021972e59c9b9ff44c5495983aa2f5b00fc
-
SHA256
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47
-
SHA512
fec4c68a21d6e525a2a0c7b4251e05411991ff7f5b700c86f7e6dffceb654f51e501eb4f5f52ff77b95d4d8d9c5fa4688744e6924a84f86b5576eecdc72e500b
-
SSDEEP
3072:XOpLeDl8+nQIw1x3Pbkfqbbf3J6mY6RxSebUXrMWJMb:RDl8+xwX3PbwUvJ6mY6xbq2
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\41871 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msgcgz.exe" svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\Sample.lnk" 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exedescription pid process target process PID 4224 set thread context of 4336 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe -
Drops file in Program Files directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\PROGRA~3\LOCALS~1\Temp\msgcgz.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exepid process 4336 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4336 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exepid process 4336 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 4336 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exedescription pid process Token: SeDebugPrivilege 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exedescription pid process target process PID 4224 wrote to memory of 4072 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe CMD.exe PID 4224 wrote to memory of 4072 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe CMD.exe PID 4224 wrote to memory of 4072 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe CMD.exe PID 4224 wrote to memory of 4956 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe CMD.exe PID 4224 wrote to memory of 4956 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe CMD.exe PID 4224 wrote to memory of 4956 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe CMD.exe PID 4224 wrote to memory of 4336 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe PID 4224 wrote to memory of 4336 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe PID 4224 wrote to memory of 4336 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe PID 4224 wrote to memory of 4336 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe PID 4224 wrote to memory of 4336 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe PID 4224 wrote to memory of 4336 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe PID 4336 wrote to memory of 648 4336 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe svchost.exe PID 4336 wrote to memory of 648 4336 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe svchost.exe PID 4336 wrote to memory of 648 4336 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe svchost.exe PID 4224 wrote to memory of 5092 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 5092 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 3832 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 3832 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 5028 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 5028 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 1816 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 1816 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 4288 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 4288 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 3840 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe PID 4224 wrote to memory of 3840 4224 8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe"C:\Users\Admin\AppData\Local\Temp\8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\CMD.exe"CMD"2⤵PID:4072
-
C:\Windows\SysWOW64\CMD.exe"CMD"2⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe"C:\Users\Admin\AppData\Local\Temp\8440d728df369728e890307c490fe4feabfe4e11d6961598db036b13b5f38c47.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:648 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:5092
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:3832
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:5028
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:1816
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:4288
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:3840