Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 12:30
Static task
static1
Behavioral task
behavioral1
Sample
292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe
Resource
win10v2004-20220812-en
General
-
Target
292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe
-
Size
186KB
-
MD5
e37df4d6ab79c1d785e4883cb2e16788
-
SHA1
009cbcab2c799d9d08a391861d7747bf2625da8a
-
SHA256
292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306
-
SHA512
a9eead45002a2e6643534887e2fe9ff117cb0f0f498ac8d7b0e4e4a7c524ace52bbef65c3cd700a98197279cae34924ee3bf9bd279e2882f42ab0b1c029a66c0
-
SSDEEP
3072:ON+fbmcn+DPc4x4wSzHQBSrhnGZq9WodVsSCPy2Ddwln5IR:c+fbV+ZxLSzzJGZ0sSyy5I
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\15549 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\mszcxftv.scr" svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exedescription pid process target process PID 916 set thread context of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe -
Drops file in Program Files directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\PROGRA~3\LOCALS~1\Temp\mszcxftv.scr svchost.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\MICROS~1.NET\FRAMEW~1\V20~1.507\AppLaunch.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
AppLaunch.exe292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exepid process 340 AppLaunch.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
AppLaunch.exepid process 340 AppLaunch.exe 340 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exedescription pid process Token: SeDebugPrivilege 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exeAppLaunch.exedescription pid process target process PID 916 wrote to memory of 1508 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe CMD.exe PID 916 wrote to memory of 1508 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe CMD.exe PID 916 wrote to memory of 1508 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe CMD.exe PID 916 wrote to memory of 1508 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe CMD.exe PID 916 wrote to memory of 1612 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe CMD.exe PID 916 wrote to memory of 1612 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe CMD.exe PID 916 wrote to memory of 1612 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe CMD.exe PID 916 wrote to memory of 1612 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe CMD.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 916 wrote to memory of 340 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe AppLaunch.exe PID 340 wrote to memory of 960 340 AppLaunch.exe svchost.exe PID 340 wrote to memory of 960 340 AppLaunch.exe svchost.exe PID 340 wrote to memory of 960 340 AppLaunch.exe svchost.exe PID 340 wrote to memory of 960 340 AppLaunch.exe svchost.exe PID 340 wrote to memory of 960 340 AppLaunch.exe svchost.exe PID 340 wrote to memory of 960 340 AppLaunch.exe svchost.exe PID 340 wrote to memory of 960 340 AppLaunch.exe svchost.exe PID 916 wrote to memory of 1972 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1972 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1972 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1972 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1164 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1164 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1164 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1164 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1212 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1212 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1212 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1212 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 276 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 276 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 276 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 276 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1648 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1648 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1648 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1648 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1768 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1768 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1768 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe PID 916 wrote to memory of 1768 916 292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe"C:\Users\Admin\AppData\Local\Temp\292a611fb6fdcf397ca67d2d35a541c8427f480a9b468f640306e00ad6912306.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\CMD.exe"CMD"2⤵PID:1508
-
C:\Windows\SysWOW64\CMD.exe"CMD"2⤵PID:1612
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:960 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:1972
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:1164
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:1212
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:276
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:1648
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/340-63-0x000000000040141C-mapping.dmp
-
memory/340-59-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/340-60-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/340-62-0x0000000000400000-0x0000000000405000-memory.dmpFilesize
20KB
-
memory/916-55-0x0000000074EE0000-0x000000007548B000-memory.dmpFilesize
5.7MB
-
memory/916-56-0x0000000074EE0000-0x000000007548B000-memory.dmpFilesize
5.7MB
-
memory/916-69-0x0000000074EE0000-0x000000007548B000-memory.dmpFilesize
5.7MB
-
memory/916-54-0x0000000076871000-0x0000000076873000-memory.dmpFilesize
8KB
-
memory/960-65-0x0000000000000000-mapping.dmp
-
memory/960-67-0x0000000000050000-0x0000000000058000-memory.dmpFilesize
32KB
-
memory/960-68-0x0000000000130000-0x0000000000135000-memory.dmpFilesize
20KB
-
memory/960-70-0x0000000000130000-0x0000000000135000-memory.dmpFilesize
20KB
-
memory/1508-57-0x0000000000000000-mapping.dmp
-
memory/1612-58-0x0000000000000000-mapping.dmp