Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe
Resource
win10v2004-20221111-en
General
-
Target
c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe
-
Size
1.2MB
-
MD5
5369e6f7725ef035d5e5ec8e1af45d12
-
SHA1
3736137464105dda712d3cdbb8fbdb405c5e95b8
-
SHA256
c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9
-
SHA512
72469168b2b143e749a1bba1daf6070a4e6d7cce2fa9fff12f0a83354cf7ff2b2a718e62641fd51d30e52be862e04c29079777cf57682277af5438ee99202e02
-
SSDEEP
24576:F4lavt0LkLL9IMixoEgea43/C/rthNheYtEdk9lq9MmCS:ckwkn9IMHea434hnHraPCS
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2032 passlist.exe 1704 Facebook Hacker.exe 280 Sysmys.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 336 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\passlist.exe c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\passlist.exe c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe -
Loads dropped DLL 5 IoCs
pid Process 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 2032 passlist.exe 2032 passlist.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\bafcac485f78b617b76b11cb26ef9cee = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Sysmys.exe\" .." Sysmys.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bafcac485f78b617b76b11cb26ef9cee = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Sysmys.exe\" .." Sysmys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 280 Sysmys.exe Token: 33 280 Sysmys.exe Token: SeIncBasePriorityPrivilege 280 Sysmys.exe Token: 33 280 Sysmys.exe Token: SeIncBasePriorityPrivilege 280 Sysmys.exe Token: 33 280 Sysmys.exe Token: SeIncBasePriorityPrivilege 280 Sysmys.exe Token: 33 280 Sysmys.exe Token: SeIncBasePriorityPrivilege 280 Sysmys.exe Token: 33 280 Sysmys.exe Token: SeIncBasePriorityPrivilege 280 Sysmys.exe Token: 33 280 Sysmys.exe Token: SeIncBasePriorityPrivilege 280 Sysmys.exe Token: 33 280 Sysmys.exe Token: SeIncBasePriorityPrivilege 280 Sysmys.exe Token: 33 280 Sysmys.exe Token: SeIncBasePriorityPrivilege 280 Sysmys.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2032 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 27 PID 1896 wrote to memory of 2032 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 27 PID 1896 wrote to memory of 2032 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 27 PID 1896 wrote to memory of 2032 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 27 PID 1896 wrote to memory of 1704 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 28 PID 1896 wrote to memory of 1704 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 28 PID 1896 wrote to memory of 1704 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 28 PID 1896 wrote to memory of 1704 1896 c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe 28 PID 2032 wrote to memory of 280 2032 passlist.exe 29 PID 2032 wrote to memory of 280 2032 passlist.exe 29 PID 2032 wrote to memory of 280 2032 passlist.exe 29 PID 2032 wrote to memory of 280 2032 passlist.exe 29 PID 280 wrote to memory of 336 280 Sysmys.exe 30 PID 280 wrote to memory of 336 280 Sysmys.exe 30 PID 280 wrote to memory of 336 280 Sysmys.exe 30 PID 280 wrote to memory of 336 280 Sysmys.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe"C:\Users\Admin\AppData\Local\Temp\c655f2335a2c36597a4f318043c09fb775c47babcfdd27b20e40eba5f54ae8e9.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\passlist.exeC:\Users\Admin\AppData\Local\Temp/passlist.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Sysmys.exe"C:\Users\Admin\AppData\Local\Temp\Sysmys.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Sysmys.exe" "Sysmys.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Facebook Hacker.exe"C:\Users\Admin\AppData\Local\Temp/Facebook Hacker.exe"2⤵
- Executes dropped EXE
PID:1704
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5ede83e94140d4d9f5cbaeac0b8c52517
SHA1c3e6dc3d4facbfe0f7900b94e93f0e1198fb0719
SHA2561b535d183ad128d8edc41cf8f6404237ee88904ff3a829bc4543791d5a09a452
SHA512ed68d102c53c557d3f897d6f08ae428983a53daa8e5523b2d1138bc341892d7187c30a1428bb51c467145f71bafa2f983c628e4dd5995a6ece6d87e81dda9c78
-
Filesize
484KB
MD5ede83e94140d4d9f5cbaeac0b8c52517
SHA1c3e6dc3d4facbfe0f7900b94e93f0e1198fb0719
SHA2561b535d183ad128d8edc41cf8f6404237ee88904ff3a829bc4543791d5a09a452
SHA512ed68d102c53c557d3f897d6f08ae428983a53daa8e5523b2d1138bc341892d7187c30a1428bb51c467145f71bafa2f983c628e4dd5995a6ece6d87e81dda9c78
-
Filesize
74KB
MD5968c5f6c828aa55e412fad62b60e43c6
SHA127b6c2d808817dddc228fe223d69c61a679d549e
SHA256e77cf362649f1e22803e8fb551bac139e2b7c399fae07c4f704a8e0bd6416990
SHA51220b1032bfc5b467d834da07df41b2a8b24efabda3d8430f9cbd341e1a947e2d1ed4ffc0eaea49da0b7db7b2e7900cf2d93aaacc5b978f71b22d644d861de0151
-
Filesize
74KB
MD5968c5f6c828aa55e412fad62b60e43c6
SHA127b6c2d808817dddc228fe223d69c61a679d549e
SHA256e77cf362649f1e22803e8fb551bac139e2b7c399fae07c4f704a8e0bd6416990
SHA51220b1032bfc5b467d834da07df41b2a8b24efabda3d8430f9cbd341e1a947e2d1ed4ffc0eaea49da0b7db7b2e7900cf2d93aaacc5b978f71b22d644d861de0151
-
Filesize
74KB
MD5968c5f6c828aa55e412fad62b60e43c6
SHA127b6c2d808817dddc228fe223d69c61a679d549e
SHA256e77cf362649f1e22803e8fb551bac139e2b7c399fae07c4f704a8e0bd6416990
SHA51220b1032bfc5b467d834da07df41b2a8b24efabda3d8430f9cbd341e1a947e2d1ed4ffc0eaea49da0b7db7b2e7900cf2d93aaacc5b978f71b22d644d861de0151
-
Filesize
74KB
MD5968c5f6c828aa55e412fad62b60e43c6
SHA127b6c2d808817dddc228fe223d69c61a679d549e
SHA256e77cf362649f1e22803e8fb551bac139e2b7c399fae07c4f704a8e0bd6416990
SHA51220b1032bfc5b467d834da07df41b2a8b24efabda3d8430f9cbd341e1a947e2d1ed4ffc0eaea49da0b7db7b2e7900cf2d93aaacc5b978f71b22d644d861de0151
-
Filesize
484KB
MD5ede83e94140d4d9f5cbaeac0b8c52517
SHA1c3e6dc3d4facbfe0f7900b94e93f0e1198fb0719
SHA2561b535d183ad128d8edc41cf8f6404237ee88904ff3a829bc4543791d5a09a452
SHA512ed68d102c53c557d3f897d6f08ae428983a53daa8e5523b2d1138bc341892d7187c30a1428bb51c467145f71bafa2f983c628e4dd5995a6ece6d87e81dda9c78
-
Filesize
74KB
MD5968c5f6c828aa55e412fad62b60e43c6
SHA127b6c2d808817dddc228fe223d69c61a679d549e
SHA256e77cf362649f1e22803e8fb551bac139e2b7c399fae07c4f704a8e0bd6416990
SHA51220b1032bfc5b467d834da07df41b2a8b24efabda3d8430f9cbd341e1a947e2d1ed4ffc0eaea49da0b7db7b2e7900cf2d93aaacc5b978f71b22d644d861de0151
-
Filesize
74KB
MD5968c5f6c828aa55e412fad62b60e43c6
SHA127b6c2d808817dddc228fe223d69c61a679d549e
SHA256e77cf362649f1e22803e8fb551bac139e2b7c399fae07c4f704a8e0bd6416990
SHA51220b1032bfc5b467d834da07df41b2a8b24efabda3d8430f9cbd341e1a947e2d1ed4ffc0eaea49da0b7db7b2e7900cf2d93aaacc5b978f71b22d644d861de0151
-
Filesize
74KB
MD5968c5f6c828aa55e412fad62b60e43c6
SHA127b6c2d808817dddc228fe223d69c61a679d549e
SHA256e77cf362649f1e22803e8fb551bac139e2b7c399fae07c4f704a8e0bd6416990
SHA51220b1032bfc5b467d834da07df41b2a8b24efabda3d8430f9cbd341e1a947e2d1ed4ffc0eaea49da0b7db7b2e7900cf2d93aaacc5b978f71b22d644d861de0151
-
Filesize
74KB
MD5968c5f6c828aa55e412fad62b60e43c6
SHA127b6c2d808817dddc228fe223d69c61a679d549e
SHA256e77cf362649f1e22803e8fb551bac139e2b7c399fae07c4f704a8e0bd6416990
SHA51220b1032bfc5b467d834da07df41b2a8b24efabda3d8430f9cbd341e1a947e2d1ed4ffc0eaea49da0b7db7b2e7900cf2d93aaacc5b978f71b22d644d861de0151