Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 23:08
Static task
static1
Behavioral task
behavioral1
Sample
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe
Resource
win10v2004-20220901-en
General
-
Target
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe
-
Size
92KB
-
MD5
2cf0a8e8e457fa7df41885787b839f98
-
SHA1
f0e0f5fe1cebe83856e74b83bb0d4d18948ee024
-
SHA256
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6
-
SHA512
5083c7ca81c620843882c566d13521be8f036d12f904aacca8ace9023a47275f5a03d2e3bb8be69ca44299c327142832c76c028fee1deae3826905c7b791e6ce
-
SSDEEP
1536:4OJMUIG+HklO8A+zjxMPIYMdcKV1vnc3CZSNYlntVYb:44jk6OyPawYMdVvnc3CZSNqtw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\drivers\\smss.exe" 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe -
Drops file in Drivers directory 2 IoCs
Processes:
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exedescription ioc process File created C:\Windows\SysWOW64\drivers\smss.exe_ 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe File opened for modification C:\Windows\SysWOW64\drivers\smss.exe_ 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exepid process 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exepid process 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exedescription pid process Token: SeDebugPrivilege 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exedescription pid process target process PID 2024 wrote to memory of 368 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe wininit.exe PID 2024 wrote to memory of 368 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe wininit.exe PID 2024 wrote to memory of 368 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe wininit.exe PID 2024 wrote to memory of 368 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe wininit.exe PID 2024 wrote to memory of 368 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe wininit.exe PID 2024 wrote to memory of 368 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe wininit.exe PID 2024 wrote to memory of 368 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe wininit.exe PID 2024 wrote to memory of 376 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe csrss.exe PID 2024 wrote to memory of 376 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe csrss.exe PID 2024 wrote to memory of 376 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe csrss.exe PID 2024 wrote to memory of 376 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe csrss.exe PID 2024 wrote to memory of 376 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe csrss.exe PID 2024 wrote to memory of 376 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe csrss.exe PID 2024 wrote to memory of 376 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe csrss.exe PID 2024 wrote to memory of 416 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe winlogon.exe PID 2024 wrote to memory of 416 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe winlogon.exe PID 2024 wrote to memory of 416 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe winlogon.exe PID 2024 wrote to memory of 416 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe winlogon.exe PID 2024 wrote to memory of 416 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe winlogon.exe PID 2024 wrote to memory of 416 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe winlogon.exe PID 2024 wrote to memory of 416 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe winlogon.exe PID 2024 wrote to memory of 460 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe services.exe PID 2024 wrote to memory of 460 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe services.exe PID 2024 wrote to memory of 460 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe services.exe PID 2024 wrote to memory of 460 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe services.exe PID 2024 wrote to memory of 460 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe services.exe PID 2024 wrote to memory of 460 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe services.exe PID 2024 wrote to memory of 460 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe services.exe PID 2024 wrote to memory of 476 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsass.exe PID 2024 wrote to memory of 476 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsass.exe PID 2024 wrote to memory of 476 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsass.exe PID 2024 wrote to memory of 476 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsass.exe PID 2024 wrote to memory of 476 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsass.exe PID 2024 wrote to memory of 476 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsass.exe PID 2024 wrote to memory of 476 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsass.exe PID 2024 wrote to memory of 484 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsm.exe PID 2024 wrote to memory of 484 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsm.exe PID 2024 wrote to memory of 484 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsm.exe PID 2024 wrote to memory of 484 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsm.exe PID 2024 wrote to memory of 484 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsm.exe PID 2024 wrote to memory of 484 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsm.exe PID 2024 wrote to memory of 484 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe lsm.exe PID 2024 wrote to memory of 596 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 596 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 596 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 596 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 596 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 596 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 596 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 672 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 672 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 672 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 672 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 672 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 672 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 672 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 748 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 748 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 748 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 748 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 748 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 748 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 748 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe PID 2024 wrote to memory of 812 2024 77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe"C:\Users\Admin\AppData\Local\Temp\77f29908936c1f57549def61a52bf7349e4cd054b04b7b905b4e3df027d691c6.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵