Analysis
-
max time kernel
189s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe
Resource
win10v2004-20221111-en
General
-
Target
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe
-
Size
246KB
-
MD5
45128efe493234906ecc0d34392b87fb
-
SHA1
614cd3f781aced63f9cbfb2d1134d193d5f917ee
-
SHA256
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
-
SHA512
5121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9
-
SSDEEP
3072:DxoVC/AFLxIu1v+Xq9EzmTpjeG/9Q04Smo5HaeD91knKkaY6l6l1GLcSf:DiQAFFJB+Xq9BTpag94SFt1Qj1Gx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchosts.exesvchosts.exepid process 1696 svchosts.exe 1444 svchosts.exe -
Loads dropped DLL 2 IoCs
Processes:
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exepid process 576 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 576 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
svchosts.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\crawls = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run svchosts.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\crawl = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exesvchosts.exedescription pid process target process PID 1332 set thread context of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1696 set thread context of 1444 1696 svchosts.exe svchosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exesvchosts.exepid process 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 1696 svchosts.exe 1696 svchosts.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exesvchosts.exedescription pid process target process PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 1332 wrote to memory of 576 1332 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe PID 576 wrote to memory of 1696 576 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe svchosts.exe PID 576 wrote to memory of 1696 576 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe svchosts.exe PID 576 wrote to memory of 1696 576 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe svchosts.exe PID 576 wrote to memory of 1696 576 78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe PID 1696 wrote to memory of 1444 1696 svchosts.exe svchosts.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe"C:\Users\Admin\AppData\Local\Temp\78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\78c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e.exe
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Roaming\svchosts.exe"C:\Users\Admin\AppData\Roaming\svchosts.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\svchosts.exe
- Executes dropped EXE
- Adds Run key to start application
PID:1444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD545128efe493234906ecc0d34392b87fb
SHA1614cd3f781aced63f9cbfb2d1134d193d5f917ee
SHA25678c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
SHA5125121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9
-
Filesize
246KB
MD545128efe493234906ecc0d34392b87fb
SHA1614cd3f781aced63f9cbfb2d1134d193d5f917ee
SHA25678c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
SHA5125121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9
-
Filesize
246KB
MD545128efe493234906ecc0d34392b87fb
SHA1614cd3f781aced63f9cbfb2d1134d193d5f917ee
SHA25678c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
SHA5125121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9
-
Filesize
246KB
MD545128efe493234906ecc0d34392b87fb
SHA1614cd3f781aced63f9cbfb2d1134d193d5f917ee
SHA25678c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
SHA5125121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9
-
Filesize
246KB
MD545128efe493234906ecc0d34392b87fb
SHA1614cd3f781aced63f9cbfb2d1134d193d5f917ee
SHA25678c32fc455ff47d15dbec31588a059e5abdf9969be1bac80930105ad3327f44e
SHA5125121c218c49fb4b862ce2a0baa85d392169fdb1d09f2a7473ff171c40610b279a2dd92a51674162b36e1583d0cfa68281c67e5728613fab1b6facd61b1239bc9