Analysis

  • max time kernel
    151s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 19:32

General

  • Target

    a1a8cc32375dbb54daf4e067da80221c27fc9601fae3efc6a6dc148421d35967.exe

  • Size

    208KB

  • MD5

    03408a1b0ae35ef438170a72ac001590

  • SHA1

    06b1786d3ca430e96367cf07e43e3a41e92ac5b9

  • SHA256

    a1a8cc32375dbb54daf4e067da80221c27fc9601fae3efc6a6dc148421d35967

  • SHA512

    fda55137d87d7f16e10de3875c1cfba0c6a51d33b4e93fe88ed2c274f9ad0c4de630734fbf425065d00e60f229bd9590d8ce971fdb7ba7291f1260a068550b0e

  • SSDEEP

    1536:Vfuxw10lxJM5y8w5OZRVmgyDl+cWaxJcveQZNTRSb3EBAR1AlQPsxjheYhpXN5yh:f0OtF2Qo7VsJgisxlYegEX0ZZbW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1a8cc32375dbb54daf4e067da80221c27fc9601fae3efc6a6dc148421d35967.exe
    "C:\Users\Admin\AppData\Local\Temp\a1a8cc32375dbb54daf4e067da80221c27fc9601fae3efc6a6dc148421d35967.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\a1a8cc32375dbb54daf4e067da80221c27fc9601fae3efc6a6dc148421d35967.exe
      "C:\Users\Admin\AppData\Local\Temp\a1a8cc32375dbb54daf4e067da80221c27fc9601fae3efc6a6dc148421d35967.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\TABHE.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svhust" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe" /f
          4⤵
          • Adds Run key to start application
          PID:888
      • C:\Users\Admin\AppData\Roaming\svhust\svhust.exe
        "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Users\Admin\AppData\Roaming\svhust\svhust.exe
          "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:112
        • C:\Users\Admin\AppData\Roaming\svhust\svhust.exe
          "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious use of FindShellTrayWindow
          PID:680

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\TABHE.bat

          Filesize

          141B

          MD5

          e83a2e0b3c1e03dfb96ffd9924117a45

          SHA1

          27a3e4ba115ba1bad0bf094f5b97e768d1ece33e

          SHA256

          655407d94fff9e707712a588d97a2017cc1c9d690a67c688ed0abcb79e452b13

          SHA512

          5f61686a3b7db3544d83a4f2ce1a75868c7dc266709f72a34eafecc3a26696a985b1912a559aed8f5a2cacbfe26be9beae2374340d1801bb18473de785557480

        • C:\Users\Admin\AppData\Roaming\svhust\svhust.exe

          Filesize

          208KB

          MD5

          e3faab8d55474f2b00bf28aa797ebbc6

          SHA1

          1256aa0ce619f17e636efcfbfe2ee8fff6329697

          SHA256

          e39e96a5eaa95af7383a8b887389361692b5d606a913396af196c6be1f857d6a

          SHA512

          2862eba5add027c358f3c249ea39894fa99f5c4d4f9124384bbf7ade1826cf208dccae3934c725d7c672c49b1640f8fe9296d64715db4388f6468f5433e4bbc4

        • C:\Users\Admin\AppData\Roaming\svhust\svhust.exe

          Filesize

          208KB

          MD5

          e3faab8d55474f2b00bf28aa797ebbc6

          SHA1

          1256aa0ce619f17e636efcfbfe2ee8fff6329697

          SHA256

          e39e96a5eaa95af7383a8b887389361692b5d606a913396af196c6be1f857d6a

          SHA512

          2862eba5add027c358f3c249ea39894fa99f5c4d4f9124384bbf7ade1826cf208dccae3934c725d7c672c49b1640f8fe9296d64715db4388f6468f5433e4bbc4

        • C:\Users\Admin\AppData\Roaming\svhust\svhust.exe

          Filesize

          208KB

          MD5

          e3faab8d55474f2b00bf28aa797ebbc6

          SHA1

          1256aa0ce619f17e636efcfbfe2ee8fff6329697

          SHA256

          e39e96a5eaa95af7383a8b887389361692b5d606a913396af196c6be1f857d6a

          SHA512

          2862eba5add027c358f3c249ea39894fa99f5c4d4f9124384bbf7ade1826cf208dccae3934c725d7c672c49b1640f8fe9296d64715db4388f6468f5433e4bbc4

        • C:\Users\Admin\AppData\Roaming\svhust\svhust.exe

          Filesize

          208KB

          MD5

          e3faab8d55474f2b00bf28aa797ebbc6

          SHA1

          1256aa0ce619f17e636efcfbfe2ee8fff6329697

          SHA256

          e39e96a5eaa95af7383a8b887389361692b5d606a913396af196c6be1f857d6a

          SHA512

          2862eba5add027c358f3c249ea39894fa99f5c4d4f9124384bbf7ade1826cf208dccae3934c725d7c672c49b1640f8fe9296d64715db4388f6468f5433e4bbc4

        • \Users\Admin\AppData\Roaming\svhust\svhust.exe

          Filesize

          208KB

          MD5

          e3faab8d55474f2b00bf28aa797ebbc6

          SHA1

          1256aa0ce619f17e636efcfbfe2ee8fff6329697

          SHA256

          e39e96a5eaa95af7383a8b887389361692b5d606a913396af196c6be1f857d6a

          SHA512

          2862eba5add027c358f3c249ea39894fa99f5c4d4f9124384bbf7ade1826cf208dccae3934c725d7c672c49b1640f8fe9296d64715db4388f6468f5433e4bbc4

        • \Users\Admin\AppData\Roaming\svhust\svhust.exe

          Filesize

          208KB

          MD5

          e3faab8d55474f2b00bf28aa797ebbc6

          SHA1

          1256aa0ce619f17e636efcfbfe2ee8fff6329697

          SHA256

          e39e96a5eaa95af7383a8b887389361692b5d606a913396af196c6be1f857d6a

          SHA512

          2862eba5add027c358f3c249ea39894fa99f5c4d4f9124384bbf7ade1826cf208dccae3934c725d7c672c49b1640f8fe9296d64715db4388f6468f5433e4bbc4

        • \Users\Admin\AppData\Roaming\svhust\svhust.exe

          Filesize

          208KB

          MD5

          e3faab8d55474f2b00bf28aa797ebbc6

          SHA1

          1256aa0ce619f17e636efcfbfe2ee8fff6329697

          SHA256

          e39e96a5eaa95af7383a8b887389361692b5d606a913396af196c6be1f857d6a

          SHA512

          2862eba5add027c358f3c249ea39894fa99f5c4d4f9124384bbf7ade1826cf208dccae3934c725d7c672c49b1640f8fe9296d64715db4388f6468f5433e4bbc4

        • \Users\Admin\AppData\Roaming\svhust\svhust.exe

          Filesize

          208KB

          MD5

          e3faab8d55474f2b00bf28aa797ebbc6

          SHA1

          1256aa0ce619f17e636efcfbfe2ee8fff6329697

          SHA256

          e39e96a5eaa95af7383a8b887389361692b5d606a913396af196c6be1f857d6a

          SHA512

          2862eba5add027c358f3c249ea39894fa99f5c4d4f9124384bbf7ade1826cf208dccae3934c725d7c672c49b1640f8fe9296d64715db4388f6468f5433e4bbc4

        • memory/112-110-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/112-115-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/680-111-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/680-108-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/680-112-0x0000000074681000-0x0000000074683000-memory.dmp

          Filesize

          8KB

        • memory/680-114-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/680-106-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/680-99-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/680-98-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/680-94-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/680-109-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/680-93-0x0000000000400000-0x0000000000479000-memory.dmp

          Filesize

          484KB

        • memory/856-61-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/856-59-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/856-62-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/856-58-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/856-65-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/856-66-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/856-107-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/856-69-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/856-70-0x0000000075F51000-0x0000000075F53000-memory.dmp

          Filesize

          8KB

        • memory/1232-56-0x00000000008BD000-0x00000000008D3000-memory.dmp

          Filesize

          88KB

        • memory/1444-82-0x00000000008DD000-0x00000000008F2000-memory.dmp

          Filesize

          84KB