Analysis

  • max time kernel
    133s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:05

General

  • Target

    0bcfe293546a8fcb666ba389bb0b9ac7eca8ebba077cc067ef8678921c2213b1.exe

  • Size

    169KB

  • MD5

    2599b6a960521a31e699d7be199fa13b

  • SHA1

    14d7fdc40271c2e29742b677ff17c1601e0f9add

  • SHA256

    0bcfe293546a8fcb666ba389bb0b9ac7eca8ebba077cc067ef8678921c2213b1

  • SHA512

    81fbde0213fc1ddb4b262b41670bf9bd9e40b0a6d50919efcdee3985c50d1d095a4d2d5687ce5c0a97d6776a4294da6824733f6ee3d5137ac2f2aab8909a8a21

  • SSDEEP

    3072:obpDCw1p3vmLvsZIaVwiwDcIbDHDCm/DERzU3B:gDCwfG1bnxLERI

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bcfe293546a8fcb666ba389bb0b9ac7eca8ebba077cc067ef8678921c2213b1.exe
    "C:\Users\Admin\AppData\Local\Temp\0bcfe293546a8fcb666ba389bb0b9ac7eca8ebba077cc067ef8678921c2213b1.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Windows\SysWOW64\REG.exe
      REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
      2⤵
      • Modifies registry key
      PID:1308
    • C:\Users\Admin\AppData\Local\Temp\avscan.exe
      C:\Users\Admin\AppData\Local\Temp\avscan.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Users\Admin\AppData\Local\Temp\avscan.exe
        C:\Users\Admin\AppData\Local\Temp\avscan.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1724
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\windows\W_X_C.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\windows\hosts.exe
          C:\windows\hosts.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1300
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
          4⤵
          • Adds policy Run key to start application
          PID:2016
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:2036
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:2044
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1724
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1704
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\windows\W_X_C.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\windows\hosts.exe
        C:\windows\hosts.exe
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Users\Admin\AppData\Local\Temp\avscan.exe
          C:\Users\Admin\AppData\Local\Temp\avscan.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1828
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c c:\windows\W_X_C.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1176
          • C:\windows\hosts.exe
            C:\windows\hosts.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1076
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
            5⤵
            • Adds policy Run key to start application
            PID:1152
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:1720
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:744
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:1120
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:816
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
        3⤵
        • Adds policy Run key to start application
        PID:1516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    217KB

    MD5

    9732d586976a0e22ea155fbaf48e1546

    SHA1

    a4040d7102d2591e58d22c2db12152a9fd3675e4

    SHA256

    a68fc0f4656c881bff640ea7fd66b8eb5f2359c6218ffb1fda86aaf5a59c3afe

    SHA512

    8e15bee51446c65b2788c25805447b75dae9ccfc24a34e7ccaccbe0ecc7c88a720c539d948b2f2478d348dc3eb9b7799bf44ca29d078f024b4ed58c502725a05

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    555KB

    MD5

    6e166c41eb39eb725d81c0368213b773

    SHA1

    f1d86e94329846682d5a00e3c75327bbb61c17f6

    SHA256

    4ac3c343f83a0a694845317aee62101298417720f024d6fa21c63ef384cb9e24

    SHA512

    224ad4b467bde2187c926bb5233b10571498a0ca7a536d0d4258cc557ac2f3f4f4f95f8a32aa1b79bb17ff480a06427cfd3c172ca77afd86c2fbccd4ffa3bf42

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    555KB

    MD5

    6e166c41eb39eb725d81c0368213b773

    SHA1

    f1d86e94329846682d5a00e3c75327bbb61c17f6

    SHA256

    4ac3c343f83a0a694845317aee62101298417720f024d6fa21c63ef384cb9e24

    SHA512

    224ad4b467bde2187c926bb5233b10571498a0ca7a536d0d4258cc557ac2f3f4f4f95f8a32aa1b79bb17ff480a06427cfd3c172ca77afd86c2fbccd4ffa3bf42

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    893KB

    MD5

    048df63d3afd92ae6df4d855587a86f8

    SHA1

    09cc9bab414602aedd33f3d05b409b04a2b0f4b5

    SHA256

    f8ed63eb99299742a7bb47fde4ee2afb9b5c66e1080af52a3d64aed24a9579f9

    SHA512

    8d5b50cd3a0ef3f24e00bc5bd52372ae1e7da8593d928f52e940e87046cb24ca22f9bd3ec6f498966a719f4674dc64346ca96178ae6afe291d7408ebe0ac994d

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    1.0MB

    MD5

    25d3cfcda74efc568328a5acfea9e29f

    SHA1

    a9442da38e9347160b2cd9dc3660fb8b229503eb

    SHA256

    bdffcaa2c27e40eab6a63bdb730765cfc5deff2d9525d3a731ee3255beb473af

    SHA512

    7d676a6462a1fec1d7282d3aa6be709936c9f911ff92b3b952bb0367c5b92e976175f7e242ad497ee9d41d19447cd5b010f8b3632ddefe4356d2b427d097ade0

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    1.0MB

    MD5

    25d3cfcda74efc568328a5acfea9e29f

    SHA1

    a9442da38e9347160b2cd9dc3660fb8b229503eb

    SHA256

    bdffcaa2c27e40eab6a63bdb730765cfc5deff2d9525d3a731ee3255beb473af

    SHA512

    7d676a6462a1fec1d7282d3aa6be709936c9f911ff92b3b952bb0367c5b92e976175f7e242ad497ee9d41d19447cd5b010f8b3632ddefe4356d2b427d097ade0

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • C:\Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • C:\Windows\W_X_C.vbs

    Filesize

    195B

    MD5

    bb5f0d81909924d647dc29f49c1ab135

    SHA1

    3f69821597fc6e1bf95639ed73729d5b28d30571

    SHA256

    71a89829e758fce2196f5ae1fce0af4110c85b65f1cacbd9d34394843a0e9563

    SHA512

    e4459b6d398a439a6c086e1fbec0ce713c530f8c6ff9237fa080eb3fed35fcb938d88eb70bef32fe5d7853435c3cca5a25c207473239c460633ac30e302765ab

  • C:\Windows\hosts.exe

    Filesize

    169KB

    MD5

    ad5def099cd680f6a415e46ca651eeed

    SHA1

    6ef715e9048e71fceb0d6b7efde521ef9a733fbe

    SHA256

    7f17710fecc387a9fea8186f83a864c5378c7d1ffbdc3d1eea13dc76ca8073ff

    SHA512

    58868eeaabec2ff7398e4193670b755f7fbaf541d5a522426e6a382990977cbb6e7e2c49caa1c6c208d33c931c53dc5c9da9e0d109755d10b6328a04ed29b7d0

  • C:\Windows\hosts.exe

    Filesize

    169KB

    MD5

    ad5def099cd680f6a415e46ca651eeed

    SHA1

    6ef715e9048e71fceb0d6b7efde521ef9a733fbe

    SHA256

    7f17710fecc387a9fea8186f83a864c5378c7d1ffbdc3d1eea13dc76ca8073ff

    SHA512

    58868eeaabec2ff7398e4193670b755f7fbaf541d5a522426e6a382990977cbb6e7e2c49caa1c6c208d33c931c53dc5c9da9e0d109755d10b6328a04ed29b7d0

  • C:\Windows\hosts.exe

    Filesize

    169KB

    MD5

    ad5def099cd680f6a415e46ca651eeed

    SHA1

    6ef715e9048e71fceb0d6b7efde521ef9a733fbe

    SHA256

    7f17710fecc387a9fea8186f83a864c5378c7d1ffbdc3d1eea13dc76ca8073ff

    SHA512

    58868eeaabec2ff7398e4193670b755f7fbaf541d5a522426e6a382990977cbb6e7e2c49caa1c6c208d33c931c53dc5c9da9e0d109755d10b6328a04ed29b7d0

  • C:\Windows\hosts.exe

    Filesize

    169KB

    MD5

    ad5def099cd680f6a415e46ca651eeed

    SHA1

    6ef715e9048e71fceb0d6b7efde521ef9a733fbe

    SHA256

    7f17710fecc387a9fea8186f83a864c5378c7d1ffbdc3d1eea13dc76ca8073ff

    SHA512

    58868eeaabec2ff7398e4193670b755f7fbaf541d5a522426e6a382990977cbb6e7e2c49caa1c6c208d33c931c53dc5c9da9e0d109755d10b6328a04ed29b7d0

  • C:\windows\hosts.exe

    Filesize

    169KB

    MD5

    ad5def099cd680f6a415e46ca651eeed

    SHA1

    6ef715e9048e71fceb0d6b7efde521ef9a733fbe

    SHA256

    7f17710fecc387a9fea8186f83a864c5378c7d1ffbdc3d1eea13dc76ca8073ff

    SHA512

    58868eeaabec2ff7398e4193670b755f7fbaf541d5a522426e6a382990977cbb6e7e2c49caa1c6c208d33c931c53dc5c9da9e0d109755d10b6328a04ed29b7d0

  • \??\c:\windows\W_X_C.bat

    Filesize

    336B

    MD5

    4db9f8b6175722b62ececeeeba1ce307

    SHA1

    3b3ba8414706e72a6fa19e884a97b87609e11e47

    SHA256

    d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78

    SHA512

    1d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • \Users\Admin\AppData\Local\Temp\avscan.exe

    Filesize

    169KB

    MD5

    0afbf03caa2fb8ee8388a11ad227c6ab

    SHA1

    f3a7c915445d41d9318b8e281183002d5eb0a023

    SHA256

    2146dc73ff1f138f971a43a5ca137b80089467c76cd28d42ff24f45adee2f8d5

    SHA512

    b49ce8d40f3231350280b3a78ebd633b524626d75f31c937c0c7cd2d93ee5fbf452cde6be25ca0690eaa01314e95fe54e8c03e06e4eb8ffb22404da682459405

  • memory/268-61-0x0000000000000000-mapping.dmp

  • memory/744-111-0x0000000000000000-mapping.dmp

  • memory/816-121-0x0000000000000000-mapping.dmp

  • memory/888-74-0x0000000000000000-mapping.dmp

  • memory/936-56-0x0000000076941000-0x0000000076943000-memory.dmp

    Filesize

    8KB

  • memory/936-58-0x0000000074D31000-0x0000000074D33000-memory.dmp

    Filesize

    8KB

  • memory/1076-98-0x0000000000000000-mapping.dmp

  • memory/1120-114-0x0000000000000000-mapping.dmp

  • memory/1152-103-0x0000000000000000-mapping.dmp

  • memory/1176-97-0x0000000000000000-mapping.dmp

  • memory/1300-77-0x0000000000000000-mapping.dmp

  • memory/1308-57-0x0000000000000000-mapping.dmp

  • memory/1448-76-0x0000000000000000-mapping.dmp

  • memory/1508-73-0x0000000000000000-mapping.dmp

  • memory/1516-87-0x0000000000000000-mapping.dmp

  • memory/1704-118-0x0000000000000000-mapping.dmp

  • memory/1720-108-0x0000000000000000-mapping.dmp

  • memory/1724-68-0x0000000000000000-mapping.dmp

  • memory/1724-115-0x0000000000000000-mapping.dmp

  • memory/1828-91-0x0000000000000000-mapping.dmp

  • memory/2016-88-0x0000000000000000-mapping.dmp

  • memory/2036-106-0x0000000000000000-mapping.dmp

  • memory/2044-110-0x0000000000000000-mapping.dmp