Analysis
-
max time kernel
150s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe
Resource
win10v2004-20220901-en
General
-
Target
b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe
-
Size
358KB
-
MD5
2c8f50f3d59e02bd80a14a6c664b9f0a
-
SHA1
df76e105f9d3fca6e3a932537af9cb070a97a313
-
SHA256
b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3
-
SHA512
69a3fb83469a1cb6dcd566666dc9071da324cf90b74600a48ed011752602b4cb7a529c433c1a0605cbded72fe8b5c15ccfc6d9d5d519172208d9505913d570fe
-
SSDEEP
6144:CYvnOeCcHE6jM5J1IeKHJg+VTQ1CRUA165UerubHCmNTsf4lJ:CYv3CyUJOeNgTgJi6VKrCi68J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 servar.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 756 netsh.exe -
Loads dropped DLL 2 IoCs
pid Process 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\b99f8a74343617249242b199cdc2b55b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\servar.exe\" .." servar.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\b99f8a74343617249242b199cdc2b55b = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\servar.exe\" .." servar.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ghh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ghh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\.exe" reg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe Token: 33 1984 servar.exe Token: SeIncBasePriorityPrivilege 1984 servar.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 856 wrote to memory of 1748 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 27 PID 856 wrote to memory of 1748 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 27 PID 856 wrote to memory of 1748 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 27 PID 856 wrote to memory of 1748 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 27 PID 1748 wrote to memory of 1756 1748 cmd.exe 29 PID 1748 wrote to memory of 1756 1748 cmd.exe 29 PID 1748 wrote to memory of 1756 1748 cmd.exe 29 PID 1748 wrote to memory of 1756 1748 cmd.exe 29 PID 856 wrote to memory of 1984 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 30 PID 856 wrote to memory of 1984 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 30 PID 856 wrote to memory of 1984 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 30 PID 856 wrote to memory of 1984 856 b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe 30 PID 1984 wrote to memory of 1296 1984 servar.exe 32 PID 1984 wrote to memory of 1296 1984 servar.exe 32 PID 1984 wrote to memory of 1296 1984 servar.exe 32 PID 1984 wrote to memory of 1296 1984 servar.exe 32 PID 1296 wrote to memory of 1496 1296 cmd.exe 33 PID 1296 wrote to memory of 1496 1296 cmd.exe 33 PID 1296 wrote to memory of 1496 1296 cmd.exe 33 PID 1296 wrote to memory of 1496 1296 cmd.exe 33 PID 1984 wrote to memory of 756 1984 servar.exe 34 PID 1984 wrote to memory of 756 1984 servar.exe 34 PID 1984 wrote to memory of 756 1984 servar.exe 34 PID 1984 wrote to memory of 756 1984 servar.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe"C:\Users\Admin\AppData\Local\Temp\b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ghh" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ghh" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe3⤵
- Adds Run key to start application
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\servar.exe"C:\Users\Admin\AppData\Local\Temp\servar.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ghh" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "ghh" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\.exe4⤵
- Adds Run key to start application
PID:1496
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\servar.exe" "servar.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:756
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD52c8f50f3d59e02bd80a14a6c664b9f0a
SHA1df76e105f9d3fca6e3a932537af9cb070a97a313
SHA256b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3
SHA51269a3fb83469a1cb6dcd566666dc9071da324cf90b74600a48ed011752602b4cb7a529c433c1a0605cbded72fe8b5c15ccfc6d9d5d519172208d9505913d570fe
-
Filesize
358KB
MD52c8f50f3d59e02bd80a14a6c664b9f0a
SHA1df76e105f9d3fca6e3a932537af9cb070a97a313
SHA256b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3
SHA51269a3fb83469a1cb6dcd566666dc9071da324cf90b74600a48ed011752602b4cb7a529c433c1a0605cbded72fe8b5c15ccfc6d9d5d519172208d9505913d570fe
-
Filesize
358KB
MD52c8f50f3d59e02bd80a14a6c664b9f0a
SHA1df76e105f9d3fca6e3a932537af9cb070a97a313
SHA256b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3
SHA51269a3fb83469a1cb6dcd566666dc9071da324cf90b74600a48ed011752602b4cb7a529c433c1a0605cbded72fe8b5c15ccfc6d9d5d519172208d9505913d570fe
-
Filesize
358KB
MD52c8f50f3d59e02bd80a14a6c664b9f0a
SHA1df76e105f9d3fca6e3a932537af9cb070a97a313
SHA256b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3
SHA51269a3fb83469a1cb6dcd566666dc9071da324cf90b74600a48ed011752602b4cb7a529c433c1a0605cbded72fe8b5c15ccfc6d9d5d519172208d9505913d570fe
-
Filesize
358KB
MD52c8f50f3d59e02bd80a14a6c664b9f0a
SHA1df76e105f9d3fca6e3a932537af9cb070a97a313
SHA256b4d0ce354cada86d495bf9afe38b3285d4bf74ed4759241a9b58f8718ec67da3
SHA51269a3fb83469a1cb6dcd566666dc9071da324cf90b74600a48ed011752602b4cb7a529c433c1a0605cbded72fe8b5c15ccfc6d9d5d519172208d9505913d570fe