Analysis

  • max time kernel
    123s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 18:46

General

  • Target

    1249492f05963be3787018636c3421c774d44ce3160bef873522598144fe250f.exe

  • Size

    363KB

  • MD5

    0827f613080113b00f9323284f52bd4a

  • SHA1

    036d0241b262d905b4b74036c497178bccecaf3e

  • SHA256

    1249492f05963be3787018636c3421c774d44ce3160bef873522598144fe250f

  • SHA512

    97fa4b74a8cf9fb0cad18acd4c9ee09109ca70e2e365c114fceb06f3ad40364f24950fcb4a389a66d669255b0cf6be49f4ccbd0ab787d0490d68fd296ec18748

  • SSDEEP

    6144:gDCwfG1bnxLERR9saoDCwfG1bnxLERR9saaH:g72bntEL9/o72bntEL9/w

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1249492f05963be3787018636c3421c774d44ce3160bef873522598144fe250f.exe
    "C:\Users\Admin\AppData\Local\Temp\1249492f05963be3787018636c3421c774d44ce3160bef873522598144fe250f.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\SysWOW64\REG.exe
      REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
      2⤵
      • Modifies registry key
      PID:684
    • C:\Users\Admin\AppData\Local\Temp\avscan.exe
      C:\Users\Admin\AppData\Local\Temp\avscan.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\avscan.exe
        C:\Users\Admin\AppData\Local\Temp\avscan.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1988
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\windows\W_X_C.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1392
        • C:\windows\hosts.exe
          C:\windows\hosts.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:432
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
          4⤵
          • Adds policy Run key to start application
          PID:472
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1652
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1996
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:2016
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1784
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\windows\W_X_C.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\windows\hosts.exe
        C:\windows\hosts.exe
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Users\Admin\AppData\Local\Temp\avscan.exe
          C:\Users\Admin\AppData\Local\Temp\avscan.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1580
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c c:\windows\W_X_C.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\windows\hosts.exe
            C:\windows\hosts.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1756
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
            5⤵
            • Adds policy Run key to start application
            PID:1520
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:1484
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:368
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:1112
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:856
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
        3⤵
        • Adds policy Run key to start application
        PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    411KB

    MD5

    429b6e4622a88c57c397b8699b748412

    SHA1

    e3d461ed07bbe10fb8cdca2b9a72f7649bfa811c

    SHA256

    8281b27baa8eccea024edefa2f4d151d6961d279dd14c1b83d3df760e5c7214e

    SHA512

    8bd1f2ac3cd4d0daa1bc9b67f7badcd5eb4c32d55a3c3687db2dc81f79e1cf376c4fcc66ad9c69e6ac57523b0f91eab875807132fa126d3fedc58da4367e92c3

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    1.1MB

    MD5

    1f11f6903b96b421deecea4bec5330f1

    SHA1

    1765ae66445488663e3fa4285f830cc78243ef3c

    SHA256

    8eaba062708955c9ba3e2d77d0c3e9f4e66771fddd1f58a10502dcd91fb520d0

    SHA512

    ef38171f254958181f443904848c061ecaa40964f7ebe61c4b799ad689212fd51a4f9c2c9ef4180fbcb630617c8b9bd9e432f9087efdd2ea6752daef55da8b30

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    1.5MB

    MD5

    e8a3b25df216470a98694fbd66579486

    SHA1

    32d1399de87bc1565f7f698cc47b612c63a7f213

    SHA256

    0579046945c7f2eb5caa49359f124d5eca4fbcf02fbd34c2f83f772bdc7e3fab

    SHA512

    f460a94afd38faffdebafda56facbb9f76afa00a62c0d6a7ae8ad235f406284eaf69d2d54fb8ee6a7f3d77275c0fd690398ee7892e7867333edca2337105860f

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    2.2MB

    MD5

    6d34a31102a576f536018e09b4e2f604

    SHA1

    3f90e32b6e91840956f91183a82689a96fa97c92

    SHA256

    d026fb08a5cef5013efd21ded48cd8e1b7d10a9dda4dffcb6ce6dcd4cbbd19d0

    SHA512

    88bb0c1026aee9a5f80ce3d497165bd630cd270fec4c0e7198079624438541bfa432d3f0ed210c26215ef2fb32bef69649172882bc6e5a49c90b77c2308f9ad4

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    2.2MB

    MD5

    e9609da51bdafd964172eccb229cf1a5

    SHA1

    f236a1df1049435b9c0c11716c15d16ccf03a3fd

    SHA256

    cb47dfbc9e6fb4b95edd23e40fc9e43b844aa634aa7f507be7e67b584e8bebc6

    SHA512

    3c1b811c7d64940904014debbfbad6269dbe99ea64efc914178c8f8e82354d049e3ef19aa15985e59fc5ec480efa9111107576dcfdbb4da0877e882c8e6c2a59

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    2.9MB

    MD5

    71020c977df59e794d60c05c7cac8ae1

    SHA1

    2c00f0321c30d465ea733368ca10e9786b22d083

    SHA256

    33ec193e11501ed95f9e3281b7ab834c6b2fed5e8e51da8d6e813e7546a1d62a

    SHA512

    c6eb952df6b701fd5bc1b2df1c5782f3b994f9081de6bf4a4d607df25b2a8ef4438e5a2addc85a4eb847b53404e35e16013e4ccbb159c3b276cd861a7d65c73c

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • C:\Windows\W_X_C.vbs

    Filesize

    195B

    MD5

    b147c267b47c4a6cfa3a72c41407541b

    SHA1

    062231bf7639b26f92e6d5ef78d515f8eaa9639d

    SHA256

    c9b7b5b912ab24c729de962727ac33835dd58f17754f9368ac702b9987f3baf6

    SHA512

    4f646fee7eaa29f33604b3f349b3d90a65bec39fdbe80bac6dcd2cd67b17475e51f833a66a5207d3008fede867792605bab132d6672e206bfefaa83aa344ac64

  • C:\Windows\hosts.exe

    Filesize

    363KB

    MD5

    ece9a1f0735c1ccd287b767a35f65d86

    SHA1

    5d5350e71ead897f66432cdd0fce160c11e9de15

    SHA256

    afc9fc7d5041f022592ef1f43aca0175ad824d241e2e9a238a72ae16a2730e06

    SHA512

    3c7fba7b8de1b201b4015a4f592aaa9b25ee018df35e85c88e9580ae7b5b48cbd16d8ab8a5db7e5f241d6a5f41d203b43365af53b14f4f41ad213b5d002385bb

  • C:\Windows\hosts.exe

    Filesize

    363KB

    MD5

    ece9a1f0735c1ccd287b767a35f65d86

    SHA1

    5d5350e71ead897f66432cdd0fce160c11e9de15

    SHA256

    afc9fc7d5041f022592ef1f43aca0175ad824d241e2e9a238a72ae16a2730e06

    SHA512

    3c7fba7b8de1b201b4015a4f592aaa9b25ee018df35e85c88e9580ae7b5b48cbd16d8ab8a5db7e5f241d6a5f41d203b43365af53b14f4f41ad213b5d002385bb

  • C:\Windows\hosts.exe

    Filesize

    363KB

    MD5

    ece9a1f0735c1ccd287b767a35f65d86

    SHA1

    5d5350e71ead897f66432cdd0fce160c11e9de15

    SHA256

    afc9fc7d5041f022592ef1f43aca0175ad824d241e2e9a238a72ae16a2730e06

    SHA512

    3c7fba7b8de1b201b4015a4f592aaa9b25ee018df35e85c88e9580ae7b5b48cbd16d8ab8a5db7e5f241d6a5f41d203b43365af53b14f4f41ad213b5d002385bb

  • C:\Windows\hosts.exe

    Filesize

    363KB

    MD5

    ece9a1f0735c1ccd287b767a35f65d86

    SHA1

    5d5350e71ead897f66432cdd0fce160c11e9de15

    SHA256

    afc9fc7d5041f022592ef1f43aca0175ad824d241e2e9a238a72ae16a2730e06

    SHA512

    3c7fba7b8de1b201b4015a4f592aaa9b25ee018df35e85c88e9580ae7b5b48cbd16d8ab8a5db7e5f241d6a5f41d203b43365af53b14f4f41ad213b5d002385bb

  • C:\windows\hosts.exe

    Filesize

    363KB

    MD5

    ece9a1f0735c1ccd287b767a35f65d86

    SHA1

    5d5350e71ead897f66432cdd0fce160c11e9de15

    SHA256

    afc9fc7d5041f022592ef1f43aca0175ad824d241e2e9a238a72ae16a2730e06

    SHA512

    3c7fba7b8de1b201b4015a4f592aaa9b25ee018df35e85c88e9580ae7b5b48cbd16d8ab8a5db7e5f241d6a5f41d203b43365af53b14f4f41ad213b5d002385bb

  • \??\c:\windows\W_X_C.bat

    Filesize

    336B

    MD5

    4db9f8b6175722b62ececeeeba1ce307

    SHA1

    3b3ba8414706e72a6fa19e884a97b87609e11e47

    SHA256

    d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78

    SHA512

    1d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    363KB

    MD5

    7b3b46aaa0c389113233bf0d29bac57d

    SHA1

    ead9c6df334fb1852f12785bc287de88bc8b9e22

    SHA256

    562a1b6bbc946351fda063f09b37fe1de8f17629864431877f5bccf0c4ea6e03

    SHA512

    206228fbc7d5552720bc94f848affa030aa5ee09a4ec958df256b54ae293d7894bbf7cf221e12fe4f51075b7cee35777abe853b947bdc6384efd31514df4aa8e

  • memory/368-112-0x0000000000000000-mapping.dmp

  • memory/432-78-0x0000000000000000-mapping.dmp

  • memory/472-101-0x0000000000000000-mapping.dmp

  • memory/584-74-0x0000000000000000-mapping.dmp

  • memory/684-57-0x0000000000000000-mapping.dmp

  • memory/856-120-0x0000000000000000-mapping.dmp

  • memory/1088-58-0x0000000074841000-0x0000000074843000-memory.dmp

    Filesize

    8KB

  • memory/1088-56-0x0000000075241000-0x0000000075243000-memory.dmp

    Filesize

    8KB

  • memory/1112-115-0x0000000000000000-mapping.dmp

  • memory/1380-76-0x0000000000000000-mapping.dmp

  • memory/1392-73-0x0000000000000000-mapping.dmp

  • memory/1484-108-0x0000000000000000-mapping.dmp

  • memory/1520-100-0x0000000000000000-mapping.dmp

  • memory/1580-89-0x0000000000000000-mapping.dmp

  • memory/1632-99-0x0000000000000000-mapping.dmp

  • memory/1652-106-0x0000000000000000-mapping.dmp

  • memory/1744-93-0x0000000000000000-mapping.dmp

  • memory/1756-94-0x0000000000000000-mapping.dmp

  • memory/1784-121-0x0000000000000000-mapping.dmp

  • memory/1988-68-0x0000000000000000-mapping.dmp

  • memory/1996-110-0x0000000000000000-mapping.dmp

  • memory/2016-114-0x0000000000000000-mapping.dmp

  • memory/2032-61-0x0000000000000000-mapping.dmp