Analysis
-
max time kernel
152s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:55
Static task
static1
Behavioral task
behavioral1
Sample
55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe
Resource
win10v2004-20221111-en
General
-
Target
55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe
-
Size
206KB
-
MD5
6c21d0c5867d51e82f3ece72274e21d2
-
SHA1
a71bc1a0391d1dd6bf94aab8746a234034700b4e
-
SHA256
55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b
-
SHA512
2a7d8cb81937055c68a2915cda35eeeb71d7e52efcfb4feea15bcca6c7b85c8350e668da520659c0c493be68926393963604c106611600feaa3927b3550196b4
-
SSDEEP
6144:oDpoeh0tRrQu3kHYPiVrhZN3SIqOWnbBO3Q9Y3Fqtw:E0tVhqVrDN3S7sg9Y39
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 460 saco.exe 1476 saco.exe -
Deletes itself 1 IoCs
pid Process 1860 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 460 saco.exe 460 saco.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run saco.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{4989F29E-0E3C-E0B4-A893-527D47D0FCBA} = "C:\\Users\\Admin\\AppData\\Roaming\\Yquq\\saco.exe" saco.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 940 set thread context of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 460 set thread context of 1476 460 saco.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
resource yara_rule behavioral1/files/0x000c000000012326-69.dat nsis_installer_1 behavioral1/files/0x000c000000012326-69.dat nsis_installer_2 behavioral1/files/0x000c000000012326-71.dat nsis_installer_1 behavioral1/files/0x000c000000012326-71.dat nsis_installer_2 behavioral1/files/0x000c000000012326-73.dat nsis_installer_1 behavioral1/files/0x000c000000012326-73.dat nsis_installer_2 behavioral1/files/0x000c000000012326-77.dat nsis_installer_1 behavioral1/files/0x000c000000012326-77.dat nsis_installer_2 behavioral1/files/0x000c000000012326-86.dat nsis_installer_1 behavioral1/files/0x000c000000012326-86.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe 1476 saco.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 940 wrote to memory of 844 940 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 28 PID 844 wrote to memory of 460 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 29 PID 844 wrote to memory of 460 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 29 PID 844 wrote to memory of 460 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 29 PID 844 wrote to memory of 460 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 29 PID 844 wrote to memory of 460 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 29 PID 844 wrote to memory of 460 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 29 PID 844 wrote to memory of 460 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 29 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 460 wrote to memory of 1476 460 saco.exe 30 PID 1476 wrote to memory of 1216 1476 saco.exe 8 PID 1476 wrote to memory of 1216 1476 saco.exe 8 PID 1476 wrote to memory of 1216 1476 saco.exe 8 PID 1476 wrote to memory of 1216 1476 saco.exe 8 PID 1476 wrote to memory of 1216 1476 saco.exe 8 PID 1476 wrote to memory of 1304 1476 saco.exe 17 PID 1476 wrote to memory of 1304 1476 saco.exe 17 PID 1476 wrote to memory of 1304 1476 saco.exe 17 PID 1476 wrote to memory of 1304 1476 saco.exe 17 PID 1476 wrote to memory of 1304 1476 saco.exe 17 PID 1476 wrote to memory of 1376 1476 saco.exe 15 PID 1476 wrote to memory of 1376 1476 saco.exe 15 PID 1476 wrote to memory of 1376 1476 saco.exe 15 PID 1476 wrote to memory of 1376 1476 saco.exe 15 PID 1476 wrote to memory of 1376 1476 saco.exe 15 PID 1476 wrote to memory of 844 1476 saco.exe 28 PID 1476 wrote to memory of 844 1476 saco.exe 28 PID 1476 wrote to memory of 844 1476 saco.exe 28 PID 1476 wrote to memory of 844 1476 saco.exe 28 PID 1476 wrote to memory of 844 1476 saco.exe 28 PID 844 wrote to memory of 1860 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 31 PID 844 wrote to memory of 1860 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 31 PID 844 wrote to memory of 1860 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 31 PID 844 wrote to memory of 1860 844 55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe 31 PID 1476 wrote to memory of 1860 1476 saco.exe 31 PID 1476 wrote to memory of 1860 1476 saco.exe 31 PID 1476 wrote to memory of 1860 1476 saco.exe 31 PID 1476 wrote to memory of 1860 1476 saco.exe 31 PID 1476 wrote to memory of 1860 1476 saco.exe 31 PID 1476 wrote to memory of 1368 1476 saco.exe 32 PID 1476 wrote to memory of 548 1476 saco.exe 33 PID 1476 wrote to memory of 548 1476 saco.exe 33 PID 1476 wrote to memory of 548 1476 saco.exe 33
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1216
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe"C:\Users\Admin\AppData\Local\Temp\55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe"C:\Users\Admin\AppData\Local\Temp\55b76d229ca2ae94f5594050bfe8dd91f8ec8b26c0c7ae1956688494b051084b.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\Yquq\saco.exe"C:\Users\Admin\AppData\Roaming\Yquq\saco.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Roaming\Yquq\saco.exe"C:\Users\Admin\AppData\Roaming\Yquq\saco.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfe80394a.bat"4⤵
- Deletes itself
PID:1860
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1304
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "17897961324346473961858362565-883259843314157900-69797020413815748161329584445"1⤵PID:1368
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:548
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD503ee5315228b556cd4ca4ea17c06679e
SHA180fe2186655e15783b15a74ef909bb85c509ddd4
SHA256d5cb6d0ad37b840f69055d906141614eb72af7cddf61cd52f173a8353d871e78
SHA5123643e2c37916ac2715b84a79b42979501e57aecde09786cdb10984a5e93c3ade113ec13a09b9428c4c1a301d72a7aeb29af9523ecf44d44703c7b3758b48aa5f
-
Filesize
206KB
MD5721b92726d58cee818e1619da714302a
SHA131e309ecd06e5c338b8a105c45d414d3d8772fdb
SHA256013f423997db780bc7d75910468960413d7c2d97318894a79a424bb833bc6e75
SHA5121ec246120a2c8d6e9fd69f24a08dc9bc9b1b8f70bad131bd95ec7e333fdc75f37b0bb7ec8aa9ce495fbf2e0ad7293444ea7d32ed4c04864eeeef066189da82f1
-
Filesize
206KB
MD5721b92726d58cee818e1619da714302a
SHA131e309ecd06e5c338b8a105c45d414d3d8772fdb
SHA256013f423997db780bc7d75910468960413d7c2d97318894a79a424bb833bc6e75
SHA5121ec246120a2c8d6e9fd69f24a08dc9bc9b1b8f70bad131bd95ec7e333fdc75f37b0bb7ec8aa9ce495fbf2e0ad7293444ea7d32ed4c04864eeeef066189da82f1
-
Filesize
206KB
MD5721b92726d58cee818e1619da714302a
SHA131e309ecd06e5c338b8a105c45d414d3d8772fdb
SHA256013f423997db780bc7d75910468960413d7c2d97318894a79a424bb833bc6e75
SHA5121ec246120a2c8d6e9fd69f24a08dc9bc9b1b8f70bad131bd95ec7e333fdc75f37b0bb7ec8aa9ce495fbf2e0ad7293444ea7d32ed4c04864eeeef066189da82f1
-
Filesize
63KB
MD5103f1a96977015f0f411cd5a1107399f
SHA13526e4fe4a8827d52079d20e7a2d0f07d2a26f24
SHA2569d75cb9eccc06d70ecb876ad9d42564b793f4b6b76b6a15395efbae36ac60259
SHA5122cb4f2723ee1bfd6dec84c264d4a8a9944c64f940f953e500a7b3cf7f49e06afd8e802f7d73dc2c06988eb8163bcce9f1d5c0fd28990bd0d8199ded58b720063
-
Filesize
63KB
MD5103f1a96977015f0f411cd5a1107399f
SHA13526e4fe4a8827d52079d20e7a2d0f07d2a26f24
SHA2569d75cb9eccc06d70ecb876ad9d42564b793f4b6b76b6a15395efbae36ac60259
SHA5122cb4f2723ee1bfd6dec84c264d4a8a9944c64f940f953e500a7b3cf7f49e06afd8e802f7d73dc2c06988eb8163bcce9f1d5c0fd28990bd0d8199ded58b720063
-
Filesize
206KB
MD5721b92726d58cee818e1619da714302a
SHA131e309ecd06e5c338b8a105c45d414d3d8772fdb
SHA256013f423997db780bc7d75910468960413d7c2d97318894a79a424bb833bc6e75
SHA5121ec246120a2c8d6e9fd69f24a08dc9bc9b1b8f70bad131bd95ec7e333fdc75f37b0bb7ec8aa9ce495fbf2e0ad7293444ea7d32ed4c04864eeeef066189da82f1
-
Filesize
206KB
MD5721b92726d58cee818e1619da714302a
SHA131e309ecd06e5c338b8a105c45d414d3d8772fdb
SHA256013f423997db780bc7d75910468960413d7c2d97318894a79a424bb833bc6e75
SHA5121ec246120a2c8d6e9fd69f24a08dc9bc9b1b8f70bad131bd95ec7e333fdc75f37b0bb7ec8aa9ce495fbf2e0ad7293444ea7d32ed4c04864eeeef066189da82f1