Analysis
-
max time kernel
150s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 23:25
Static task
static1
Behavioral task
behavioral1
Sample
81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe
Resource
win10v2004-20220901-en
General
-
Target
81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe
-
Size
299KB
-
MD5
92170476df42a42bcb8757428c29e12b
-
SHA1
55cf5da615168ffc05a10b22451470238d77da75
-
SHA256
81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40
-
SHA512
98358202511c926784580fea90c49470c71511a2b4e7e27c67cb7046a3aa97f0f4de4f977500b38b81d4fe22437285cdeb5ce4cdacc01657450ae719558fa71e
-
SSDEEP
6144:i39X9aX84E+Uguvgf4PGs6518/H4bkF5ZxXzQI03rYQs3INDRV:Igs9rgeG4N6SFFDQT7YfINDRV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xmmslvcvjh.exepid process 1488 xmmslvcvjh.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1520 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
cmd.exexmmslvcvjh.exepid process 1520 cmd.exe 1520 cmd.exe 1488 xmmslvcvjh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 668 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
xmmslvcvjh.exepid process 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 668 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
xmmslvcvjh.exepid process 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
xmmslvcvjh.exepid process 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe 1488 xmmslvcvjh.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.execmd.exedescription pid process target process PID 1752 wrote to memory of 1520 1752 81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe cmd.exe PID 1752 wrote to memory of 1520 1752 81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe cmd.exe PID 1752 wrote to memory of 1520 1752 81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe cmd.exe PID 1752 wrote to memory of 1520 1752 81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe cmd.exe PID 1520 wrote to memory of 668 1520 cmd.exe taskkill.exe PID 1520 wrote to memory of 668 1520 cmd.exe taskkill.exe PID 1520 wrote to memory of 668 1520 cmd.exe taskkill.exe PID 1520 wrote to memory of 668 1520 cmd.exe taskkill.exe PID 1520 wrote to memory of 1484 1520 cmd.exe PING.EXE PID 1520 wrote to memory of 1484 1520 cmd.exe PING.EXE PID 1520 wrote to memory of 1484 1520 cmd.exe PING.EXE PID 1520 wrote to memory of 1484 1520 cmd.exe PING.EXE PID 1520 wrote to memory of 1488 1520 cmd.exe xmmslvcvjh.exe PID 1520 wrote to memory of 1488 1520 cmd.exe xmmslvcvjh.exe PID 1520 wrote to memory of 1488 1520 cmd.exe xmmslvcvjh.exe PID 1520 wrote to memory of 1488 1520 cmd.exe xmmslvcvjh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe"C:\Users\Admin\AppData\Local\Temp\81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1752 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\81cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40.exe" & start C:\Users\Admin\AppData\Local\XMMSLV~1.EXE -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 17523⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\xmmslvcvjh.exeC:\Users\Admin\AppData\Local\XMMSLV~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\xmmslvcvjh.exeFilesize
299KB
MD592170476df42a42bcb8757428c29e12b
SHA155cf5da615168ffc05a10b22451470238d77da75
SHA25681cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40
SHA51298358202511c926784580fea90c49470c71511a2b4e7e27c67cb7046a3aa97f0f4de4f977500b38b81d4fe22437285cdeb5ce4cdacc01657450ae719558fa71e
-
C:\Users\Admin\AppData\Local\xmmslvcvjh.exeFilesize
299KB
MD592170476df42a42bcb8757428c29e12b
SHA155cf5da615168ffc05a10b22451470238d77da75
SHA25681cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40
SHA51298358202511c926784580fea90c49470c71511a2b4e7e27c67cb7046a3aa97f0f4de4f977500b38b81d4fe22437285cdeb5ce4cdacc01657450ae719558fa71e
-
\Users\Admin\AppData\Local\xmmslvcvjh.exeFilesize
299KB
MD592170476df42a42bcb8757428c29e12b
SHA155cf5da615168ffc05a10b22451470238d77da75
SHA25681cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40
SHA51298358202511c926784580fea90c49470c71511a2b4e7e27c67cb7046a3aa97f0f4de4f977500b38b81d4fe22437285cdeb5ce4cdacc01657450ae719558fa71e
-
\Users\Admin\AppData\Local\xmmslvcvjh.exeFilesize
299KB
MD592170476df42a42bcb8757428c29e12b
SHA155cf5da615168ffc05a10b22451470238d77da75
SHA25681cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40
SHA51298358202511c926784580fea90c49470c71511a2b4e7e27c67cb7046a3aa97f0f4de4f977500b38b81d4fe22437285cdeb5ce4cdacc01657450ae719558fa71e
-
\Users\Admin\AppData\Local\xmmslvcvjh.exeFilesize
299KB
MD592170476df42a42bcb8757428c29e12b
SHA155cf5da615168ffc05a10b22451470238d77da75
SHA25681cd9e331e7cfc13b2efef3d46fa241afd5770994d86bc30dbe029b3fc194c40
SHA51298358202511c926784580fea90c49470c71511a2b4e7e27c67cb7046a3aa97f0f4de4f977500b38b81d4fe22437285cdeb5ce4cdacc01657450ae719558fa71e
-
memory/668-58-0x0000000000000000-mapping.dmp
-
memory/1484-59-0x0000000000000000-mapping.dmp
-
memory/1488-63-0x0000000000000000-mapping.dmp
-
memory/1488-68-0x0000000001000000-0x00000000010A6000-memory.dmpFilesize
664KB
-
memory/1488-69-0x0000000001000000-0x00000000010A6000-memory.dmpFilesize
664KB
-
memory/1520-56-0x0000000000000000-mapping.dmp
-
memory/1752-57-0x0000000001000000-0x00000000010A6000-memory.dmpFilesize
664KB
-
memory/1752-54-0x0000000075111000-0x0000000075113000-memory.dmpFilesize
8KB
-
memory/1752-55-0x0000000001000000-0x00000000010A6000-memory.dmpFilesize
664KB