Analysis
-
max time kernel
193s -
max time network
201s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe
Resource
win10v2004-20220812-en
General
-
Target
443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe
-
Size
138KB
-
MD5
0de785a3d83482ee5b7e3e396a641bc7
-
SHA1
fc7326166024e8edfec82524e4a1e98041561fa4
-
SHA256
443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51
-
SHA512
4345256e2a5906e8e962728f8a737505a17f5c5fc4018b48cc79ef75e8bcdaf2d049e9f0828b0f2961f673c9f68f89220dab3f714b94ace5b4037b55f996362f
-
SSDEEP
3072:7jyt0PeqCxRFPTd0nnqAY6xLdzTSQh1eK0jjGoeB44R/Gzkvx:7jMoCxTPTd85XHSQbe/avIzkv
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hemxccape.exe 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hemxccape.exe\DisableExceptionChainValidation 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Avira 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\avast! Antivirus 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created C:\ProgramData\Quicktime 8.5.1\desktop.ini 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1364 schtasks.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{A65FFD7B-53D7-3F48-AAEE-F84252C5580B}\03C40151 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{A65FFD7B-53D7-3F48-AAEE-F84252C5580B}\03C40151\CG1\HAL = 05ee0000 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{A65FFD7B-53D7-3F48-AAEE-F84252C5580B}\03C40151\ê'du3 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{A65FFD7B-53D7-3F48-AAEE-F84252C5580B}\03C40151\ê'du3\BID = 200008001a000b00e6070000140000001a0000002500130000000000bf5f8163 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{A65FFD7B-53D7-3F48-AAEE-F84252C5580B}\03C40151\CG1 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\CLSID\{A65FFD7B-53D7-3F48-AAEE-F84252C5580B} 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Token: SeBackupPrivilege 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe Token: SeDebugPrivilege 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1364 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 28 PID 1940 wrote to memory of 1364 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 28 PID 1940 wrote to memory of 1364 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 28 PID 1940 wrote to memory of 1364 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 28 PID 1940 wrote to memory of 1380 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 30 PID 1940 wrote to memory of 1380 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 30 PID 1940 wrote to memory of 1380 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 30 PID 1940 wrote to memory of 1380 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 30 PID 1940 wrote to memory of 1380 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 30 PID 1940 wrote to memory of 1380 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 30 PID 1940 wrote to memory of 1380 1940 443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe"C:\Users\Admin\AppData\Local\Temp\443095db638f2eb172dbfbe3730407c033b5ec86dde1e8b2f65df703b85cca51.exe"1⤵
- Sets file execution options in registry
- Checks for any installed AV software in registry
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Update Check - 0x03C40151" /TR "C:\ProgramData\Quicktime 8.5.1\hemxccape.exe" /RL HIGHEST2⤵
- Creates scheduled task(s)
PID:1364
-
-
C:\Windows\SysWOW64\WerFault.exe"C:\Windows\SysWOW64\WerFault.exe"2⤵PID:1380
-