Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:52
Static task
static1
Behavioral task
behavioral1
Sample
1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe
Resource
win10v2004-20220901-en
General
-
Target
1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe
-
Size
23.9MB
-
MD5
03477562a5e3e8ea14776e5112145287
-
SHA1
848c678f64d57462ac8287d26b1774e4955f59a5
-
SHA256
1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b
-
SHA512
fc5c5d4729941cb4f2dc559077e705b981cc53d2938429e622eb14010b03ee9b4ac28f1f1bd943e1d97832658f0a0fc6244ac4a5de4172c64975c95e84a77f71
-
SSDEEP
393216:V6bDIK+QhSqWaMdVMXQahXezeoJiX1p7Pvhtezbu6E4Cf8/BiDaccZIofEPjcFTB:VecqSqWavHOzbcX15HXAHCtDatTfqIJB
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" sovst.exe -
Executes dropped EXE 4 IoCs
pid Process 1020 sovst.exe 1252 86.exe 1408 sovst.exe 1012 is-RI7AQ.tmp -
Loads dropped DLL 13 IoCs
pid Process 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 1020 sovst.exe 1252 86.exe 1012 is-RI7AQ.tmp 1012 is-RI7AQ.tmp 1012 is-RI7AQ.tmp -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce sovst.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\windose = "C:\\Users\\Admin\\AppData\\Local\\Temp\\windose\\sovst.exe" sovst.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00080000000126c7-55.dat autoit_exe behavioral1/files/0x00080000000126c7-56.dat autoit_exe behavioral1/files/0x00080000000126c7-57.dat autoit_exe behavioral1/files/0x00080000000126c7-58.dat autoit_exe behavioral1/files/0x00080000000126c7-60.dat autoit_exe behavioral1/files/0x00080000000126c7-62.dat autoit_exe behavioral1/files/0x00080000000126c7-70.dat autoit_exe behavioral1/files/0x00080000000126c7-88.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1020 set thread context of 1408 1020 sovst.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1020 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 28 PID 1952 wrote to memory of 1020 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 28 PID 1952 wrote to memory of 1020 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 28 PID 1952 wrote to memory of 1020 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 28 PID 1952 wrote to memory of 1020 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 28 PID 1952 wrote to memory of 1020 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 28 PID 1952 wrote to memory of 1020 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 28 PID 1952 wrote to memory of 1252 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 29 PID 1952 wrote to memory of 1252 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 29 PID 1952 wrote to memory of 1252 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 29 PID 1952 wrote to memory of 1252 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 29 PID 1952 wrote to memory of 1252 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 29 PID 1952 wrote to memory of 1252 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 29 PID 1952 wrote to memory of 1252 1952 1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe 29 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1020 wrote to memory of 1408 1020 sovst.exe 30 PID 1252 wrote to memory of 1012 1252 86.exe 31 PID 1252 wrote to memory of 1012 1252 86.exe 31 PID 1252 wrote to memory of 1012 1252 86.exe 31 PID 1252 wrote to memory of 1012 1252 86.exe 31 PID 1252 wrote to memory of 1012 1252 86.exe 31 PID 1252 wrote to memory of 1012 1252 86.exe 31 PID 1252 wrote to memory of 1012 1252 86.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe"C:\Users\Admin\AppData\Local\Temp\1dac49a6d6752628e50bc92638bdaab89ecb1783075d42236939ce944c1b979b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\windose\sovst.exe"C:\Users\Admin\AppData\Local\Temp\windose\sovst.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\windose\sovst.exe"C:\Users\Admin\AppData\Local\Temp\windose\sovst.exe"3⤵
- Executes dropped EXE
PID:1408
-
-
-
C:\Users\Admin\AppData\Local\Temp\windose\86.exe"C:\Users\Admin\AppData\Local\Temp\windose\86.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\is-QK381.tmp\is-RI7AQ.tmp"C:\Users\Admin\AppData\Local\Temp\is-QK381.tmp\is-RI7AQ.tmp" /SL4 $30176 "C:\Users\Admin\AppData\Local\Temp\windose\86.exe" 23708527 527363⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5f627721a34c13a5307779a498e8f6519
SHA19e54ec07e780eb1ccbbd61bb1a24238e46c01e18
SHA25613c6a795a259a9731d5c00f35e6eeeeae840423d3e1783fd6c75509a3b7cb348
SHA512c2dc88b441539b8827f0ef2a4c6b404cebaa5452d884d0174a2447347a462552f47a9d6521ecfa660cd9f0e0771fc192438865dcda305ab373c6f9a0c694aecc
-
Filesize
658KB
MD5f627721a34c13a5307779a498e8f6519
SHA19e54ec07e780eb1ccbbd61bb1a24238e46c01e18
SHA25613c6a795a259a9731d5c00f35e6eeeeae840423d3e1783fd6c75509a3b7cb348
SHA512c2dc88b441539b8827f0ef2a4c6b404cebaa5452d884d0174a2447347a462552f47a9d6521ecfa660cd9f0e0771fc192438865dcda305ab373c6f9a0c694aecc
-
Filesize
22.8MB
MD5f175e21916c166cd829572f323d36350
SHA1c19b849479060a60b643c7234cbccd62fe1dea4b
SHA2561b4f9bfa65543789b5479d555fd430070eaa6abe3361c550db9af387af03355e
SHA512bc8be50d5030c47d357ab69f1cd616802e0070c241bfdb194671daa01fc3f801461ce6d25878e6b3fa51cf7f4fbd3fb7b55a9910f7cd89347f1005b8b78be356
-
Filesize
22.8MB
MD5f175e21916c166cd829572f323d36350
SHA1c19b849479060a60b643c7234cbccd62fe1dea4b
SHA2561b4f9bfa65543789b5479d555fd430070eaa6abe3361c550db9af387af03355e
SHA512bc8be50d5030c47d357ab69f1cd616802e0070c241bfdb194671daa01fc3f801461ce6d25878e6b3fa51cf7f4fbd3fb7b55a9910f7cd89347f1005b8b78be356
-
Filesize
1.4MB
MD53797e5b27198143007d4f1b719d5825a
SHA18fcbdb72d83e95b86ede9ffe60d0716ddeecffe2
SHA25680f97944337fb65e9d57644b786bfb0613850dbb568c06604b438e9038f7e6a5
SHA51214c156a9e754cbc8467c2f792262c8d010a55d56fdf5429ac0c0fba297cc44d6b3e5c3bea1ccb6fec2e9e7c586e162480f0d245cc0176ec1369a85c7a8438b87
-
Filesize
1.4MB
MD53797e5b27198143007d4f1b719d5825a
SHA18fcbdb72d83e95b86ede9ffe60d0716ddeecffe2
SHA25680f97944337fb65e9d57644b786bfb0613850dbb568c06604b438e9038f7e6a5
SHA51214c156a9e754cbc8467c2f792262c8d010a55d56fdf5429ac0c0fba297cc44d6b3e5c3bea1ccb6fec2e9e7c586e162480f0d245cc0176ec1369a85c7a8438b87
-
Filesize
1.4MB
MD53797e5b27198143007d4f1b719d5825a
SHA18fcbdb72d83e95b86ede9ffe60d0716ddeecffe2
SHA25680f97944337fb65e9d57644b786bfb0613850dbb568c06604b438e9038f7e6a5
SHA51214c156a9e754cbc8467c2f792262c8d010a55d56fdf5429ac0c0fba297cc44d6b3e5c3bea1ccb6fec2e9e7c586e162480f0d245cc0176ec1369a85c7a8438b87
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
658KB
MD5f627721a34c13a5307779a498e8f6519
SHA19e54ec07e780eb1ccbbd61bb1a24238e46c01e18
SHA25613c6a795a259a9731d5c00f35e6eeeeae840423d3e1783fd6c75509a3b7cb348
SHA512c2dc88b441539b8827f0ef2a4c6b404cebaa5452d884d0174a2447347a462552f47a9d6521ecfa660cd9f0e0771fc192438865dcda305ab373c6f9a0c694aecc
-
Filesize
22.8MB
MD5f175e21916c166cd829572f323d36350
SHA1c19b849479060a60b643c7234cbccd62fe1dea4b
SHA2561b4f9bfa65543789b5479d555fd430070eaa6abe3361c550db9af387af03355e
SHA512bc8be50d5030c47d357ab69f1cd616802e0070c241bfdb194671daa01fc3f801461ce6d25878e6b3fa51cf7f4fbd3fb7b55a9910f7cd89347f1005b8b78be356
-
Filesize
22.8MB
MD5f175e21916c166cd829572f323d36350
SHA1c19b849479060a60b643c7234cbccd62fe1dea4b
SHA2561b4f9bfa65543789b5479d555fd430070eaa6abe3361c550db9af387af03355e
SHA512bc8be50d5030c47d357ab69f1cd616802e0070c241bfdb194671daa01fc3f801461ce6d25878e6b3fa51cf7f4fbd3fb7b55a9910f7cd89347f1005b8b78be356
-
Filesize
22.8MB
MD5f175e21916c166cd829572f323d36350
SHA1c19b849479060a60b643c7234cbccd62fe1dea4b
SHA2561b4f9bfa65543789b5479d555fd430070eaa6abe3361c550db9af387af03355e
SHA512bc8be50d5030c47d357ab69f1cd616802e0070c241bfdb194671daa01fc3f801461ce6d25878e6b3fa51cf7f4fbd3fb7b55a9910f7cd89347f1005b8b78be356
-
Filesize
22.8MB
MD5f175e21916c166cd829572f323d36350
SHA1c19b849479060a60b643c7234cbccd62fe1dea4b
SHA2561b4f9bfa65543789b5479d555fd430070eaa6abe3361c550db9af387af03355e
SHA512bc8be50d5030c47d357ab69f1cd616802e0070c241bfdb194671daa01fc3f801461ce6d25878e6b3fa51cf7f4fbd3fb7b55a9910f7cd89347f1005b8b78be356
-
Filesize
1.4MB
MD53797e5b27198143007d4f1b719d5825a
SHA18fcbdb72d83e95b86ede9ffe60d0716ddeecffe2
SHA25680f97944337fb65e9d57644b786bfb0613850dbb568c06604b438e9038f7e6a5
SHA51214c156a9e754cbc8467c2f792262c8d010a55d56fdf5429ac0c0fba297cc44d6b3e5c3bea1ccb6fec2e9e7c586e162480f0d245cc0176ec1369a85c7a8438b87
-
Filesize
1.4MB
MD53797e5b27198143007d4f1b719d5825a
SHA18fcbdb72d83e95b86ede9ffe60d0716ddeecffe2
SHA25680f97944337fb65e9d57644b786bfb0613850dbb568c06604b438e9038f7e6a5
SHA51214c156a9e754cbc8467c2f792262c8d010a55d56fdf5429ac0c0fba297cc44d6b3e5c3bea1ccb6fec2e9e7c586e162480f0d245cc0176ec1369a85c7a8438b87
-
Filesize
1.4MB
MD53797e5b27198143007d4f1b719d5825a
SHA18fcbdb72d83e95b86ede9ffe60d0716ddeecffe2
SHA25680f97944337fb65e9d57644b786bfb0613850dbb568c06604b438e9038f7e6a5
SHA51214c156a9e754cbc8467c2f792262c8d010a55d56fdf5429ac0c0fba297cc44d6b3e5c3bea1ccb6fec2e9e7c586e162480f0d245cc0176ec1369a85c7a8438b87
-
Filesize
1.4MB
MD53797e5b27198143007d4f1b719d5825a
SHA18fcbdb72d83e95b86ede9ffe60d0716ddeecffe2
SHA25680f97944337fb65e9d57644b786bfb0613850dbb568c06604b438e9038f7e6a5
SHA51214c156a9e754cbc8467c2f792262c8d010a55d56fdf5429ac0c0fba297cc44d6b3e5c3bea1ccb6fec2e9e7c586e162480f0d245cc0176ec1369a85c7a8438b87
-
Filesize
1.4MB
MD53797e5b27198143007d4f1b719d5825a
SHA18fcbdb72d83e95b86ede9ffe60d0716ddeecffe2
SHA25680f97944337fb65e9d57644b786bfb0613850dbb568c06604b438e9038f7e6a5
SHA51214c156a9e754cbc8467c2f792262c8d010a55d56fdf5429ac0c0fba297cc44d6b3e5c3bea1ccb6fec2e9e7c586e162480f0d245cc0176ec1369a85c7a8438b87