Analysis
-
max time kernel
248s -
max time network
356s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 20:57
Static task
static1
Behavioral task
behavioral1
Sample
4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe
Resource
win10v2004-20220812-en
General
-
Target
4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe
-
Size
377KB
-
MD5
641855448f414edc830470f5e94ce912
-
SHA1
0c583e3346eb1eecfed3428ba24028f7ed76a91a
-
SHA256
4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac
-
SHA512
5b0025957a981f35d14e868c7924d893a85b8425c4da90781e0db25b7d97d5eaae05c83ea219dedae34ed345f6345ef373dd4427f6c9af418df4d621f51f8f19
-
SSDEEP
6144:XlCA2GhNH75bYjVQMS38Gwf2hzIBp3BFlS2JIngauf1NG3DYv3JphAo88S011TE2:XJ2iNH7lZ8YhzIBNhJvntk3u3Jpil8pB
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 668 LookupSvi.exe 860 secdrv.exe 1508 secdrv.exe 936 LookupSvi.exe 1284 LookupSvi.exe -
Loads dropped DLL 3 IoCs
pid Process 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Macrovision Security = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\LookupSvi.exe" LookupSvi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Macrovision Security = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\LookupSvi.exe" LookupSvi.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Macrovision Security = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\LookupSvi.exe" LookupSvi.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 540 set thread context of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 860 set thread context of 1508 860 secdrv.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 668 LookupSvi.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe Token: SeDebugPrivilege 792 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe Token: SeDebugPrivilege 792 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe Token: SeDebugPrivilege 668 LookupSvi.exe Token: SeDebugPrivilege 860 secdrv.exe Token: SeDebugPrivilege 1284 LookupSvi.exe Token: SeDebugPrivilege 936 LookupSvi.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 792 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 792 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 28 PID 540 wrote to memory of 668 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 29 PID 540 wrote to memory of 668 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 29 PID 540 wrote to memory of 668 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 29 PID 540 wrote to memory of 668 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 29 PID 668 wrote to memory of 860 668 LookupSvi.exe 30 PID 668 wrote to memory of 860 668 LookupSvi.exe 30 PID 668 wrote to memory of 860 668 LookupSvi.exe 30 PID 668 wrote to memory of 860 668 LookupSvi.exe 30 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 860 wrote to memory of 1508 860 secdrv.exe 31 PID 540 wrote to memory of 936 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 32 PID 540 wrote to memory of 936 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 32 PID 540 wrote to memory of 936 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 32 PID 540 wrote to memory of 936 540 4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe 32 PID 860 wrote to memory of 1284 860 secdrv.exe 33 PID 860 wrote to memory of 1284 860 secdrv.exe 33 PID 860 wrote to memory of 1284 860 secdrv.exe 33 PID 860 wrote to memory of 1284 860 secdrv.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe"C:\Users\Admin\AppData\Local\Temp\4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe"C:\Users\Admin\AppData\Local\Temp\4802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:792
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"4⤵
- Executes dropped EXE
PID:1508
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5541ed4a8599aa9e50dc9bca5982f1537
SHA10e8af5d101acab81d7ba6ee83fee8e1f407c3d45
SHA2564e36e827a3c745027839555c71b2c137740077a8aee93487a28cd8db54a472ed
SHA51263f99c8328f266da6ecb841b0893290aadb4e503a263d7c08a29e845aa3475c212c11ed151e81fc654eeb63f235cd76a42f7928e37e8d81c51ba817216ce125e
-
Filesize
13KB
MD5541ed4a8599aa9e50dc9bca5982f1537
SHA10e8af5d101acab81d7ba6ee83fee8e1f407c3d45
SHA2564e36e827a3c745027839555c71b2c137740077a8aee93487a28cd8db54a472ed
SHA51263f99c8328f266da6ecb841b0893290aadb4e503a263d7c08a29e845aa3475c212c11ed151e81fc654eeb63f235cd76a42f7928e37e8d81c51ba817216ce125e
-
Filesize
13KB
MD5541ed4a8599aa9e50dc9bca5982f1537
SHA10e8af5d101acab81d7ba6ee83fee8e1f407c3d45
SHA2564e36e827a3c745027839555c71b2c137740077a8aee93487a28cd8db54a472ed
SHA51263f99c8328f266da6ecb841b0893290aadb4e503a263d7c08a29e845aa3475c212c11ed151e81fc654eeb63f235cd76a42f7928e37e8d81c51ba817216ce125e
-
Filesize
13KB
MD5541ed4a8599aa9e50dc9bca5982f1537
SHA10e8af5d101acab81d7ba6ee83fee8e1f407c3d45
SHA2564e36e827a3c745027839555c71b2c137740077a8aee93487a28cd8db54a472ed
SHA51263f99c8328f266da6ecb841b0893290aadb4e503a263d7c08a29e845aa3475c212c11ed151e81fc654eeb63f235cd76a42f7928e37e8d81c51ba817216ce125e
-
Filesize
13KB
MD5541ed4a8599aa9e50dc9bca5982f1537
SHA10e8af5d101acab81d7ba6ee83fee8e1f407c3d45
SHA2564e36e827a3c745027839555c71b2c137740077a8aee93487a28cd8db54a472ed
SHA51263f99c8328f266da6ecb841b0893290aadb4e503a263d7c08a29e845aa3475c212c11ed151e81fc654eeb63f235cd76a42f7928e37e8d81c51ba817216ce125e
-
Filesize
377KB
MD5641855448f414edc830470f5e94ce912
SHA10c583e3346eb1eecfed3428ba24028f7ed76a91a
SHA2564802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac
SHA5125b0025957a981f35d14e868c7924d893a85b8425c4da90781e0db25b7d97d5eaae05c83ea219dedae34ed345f6345ef373dd4427f6c9af418df4d621f51f8f19
-
Filesize
377KB
MD5641855448f414edc830470f5e94ce912
SHA10c583e3346eb1eecfed3428ba24028f7ed76a91a
SHA2564802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac
SHA5125b0025957a981f35d14e868c7924d893a85b8425c4da90781e0db25b7d97d5eaae05c83ea219dedae34ed345f6345ef373dd4427f6c9af418df4d621f51f8f19
-
Filesize
377KB
MD5641855448f414edc830470f5e94ce912
SHA10c583e3346eb1eecfed3428ba24028f7ed76a91a
SHA2564802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac
SHA5125b0025957a981f35d14e868c7924d893a85b8425c4da90781e0db25b7d97d5eaae05c83ea219dedae34ed345f6345ef373dd4427f6c9af418df4d621f51f8f19
-
Filesize
13KB
MD5541ed4a8599aa9e50dc9bca5982f1537
SHA10e8af5d101acab81d7ba6ee83fee8e1f407c3d45
SHA2564e36e827a3c745027839555c71b2c137740077a8aee93487a28cd8db54a472ed
SHA51263f99c8328f266da6ecb841b0893290aadb4e503a263d7c08a29e845aa3475c212c11ed151e81fc654eeb63f235cd76a42f7928e37e8d81c51ba817216ce125e
-
Filesize
13KB
MD5541ed4a8599aa9e50dc9bca5982f1537
SHA10e8af5d101acab81d7ba6ee83fee8e1f407c3d45
SHA2564e36e827a3c745027839555c71b2c137740077a8aee93487a28cd8db54a472ed
SHA51263f99c8328f266da6ecb841b0893290aadb4e503a263d7c08a29e845aa3475c212c11ed151e81fc654eeb63f235cd76a42f7928e37e8d81c51ba817216ce125e
-
Filesize
377KB
MD5641855448f414edc830470f5e94ce912
SHA10c583e3346eb1eecfed3428ba24028f7ed76a91a
SHA2564802f50d6851e4e118bca0dc077ebfb4489054bfd00c36fda8bb5b87c41740ac
SHA5125b0025957a981f35d14e868c7924d893a85b8425c4da90781e0db25b7d97d5eaae05c83ea219dedae34ed345f6345ef373dd4427f6c9af418df4d621f51f8f19