Analysis
-
max time kernel
186s -
max time network
207s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 07:32
Static task
static1
Behavioral task
behavioral1
Sample
1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe
Resource
win10v2004-20220812-en
General
-
Target
1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe
-
Size
216KB
-
MD5
18da21337a68b2edf0abedc4a6cb6b0c
-
SHA1
a42a59f6a2a778ece6cdf55d58ba58243e06a57c
-
SHA256
1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626
-
SHA512
60ad568cf5dcf02fc612972d1ff1836af924815c7be7ef106b4d565d81326fb3565ba7fa4e98016385a1f093c4b1a84fae0d4a44b84fcee92c29425dfe435487
-
SSDEEP
3072:rawhW9eOEtiOOrKOoVfyAvs56z/fBTZ+J/h/GfJYO/SB+NvXY7JMW:rq/BpZooAkYfRZ+J/UR/HvXY
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file 1 IoCs
Processes:
explorer.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\82b2b9a.exe explorer.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 916 vssadmin.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{60143476-B13E-47D3-A90E-DC35EE535B5E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{60143476-B13E-47D3-A90E-DC35EE535B5E}\WpadNetworkName = "Network 2" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{60143476-B13E-47D3-A90E-DC35EE535B5E}\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{60143476-B13E-47D3-A90E-DC35EE535B5E}\fa-a0-1b-4a-da-06 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a0-1b-4a-da-06\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{60143476-B13E-47D3-A90E-DC35EE535B5E}\WpadDecisionTime = b0a75113e401d901 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f001a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{60143476-B13E-47D3-A90E-DC35EE535B5E}\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a0-1b-4a-da-06 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a0-1b-4a-da-06\WpadDecisionTime = b0a75113e401d901 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a0-1b-4a-da-06\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exepid process 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exeexplorer.exepid process 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe 1656 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1292 vssvc.exe Token: SeRestorePrivilege 1292 vssvc.exe Token: SeAuditPrivilege 1292 vssvc.exe Token: SeShutdownPrivilege 1216 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1216 1216 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1216 1216 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exepid process 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exeexplorer.exedescription pid process target process PID 1984 wrote to memory of 1656 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe explorer.exe PID 1984 wrote to memory of 1656 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe explorer.exe PID 1984 wrote to memory of 1656 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe explorer.exe PID 1984 wrote to memory of 1656 1984 1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe explorer.exe PID 1656 wrote to memory of 960 1656 explorer.exe svchost.exe PID 1656 wrote to memory of 960 1656 explorer.exe svchost.exe PID 1656 wrote to memory of 960 1656 explorer.exe svchost.exe PID 1656 wrote to memory of 960 1656 explorer.exe svchost.exe PID 1656 wrote to memory of 916 1656 explorer.exe vssadmin.exe PID 1656 wrote to memory of 916 1656 explorer.exe vssadmin.exe PID 1656 wrote to memory of 916 1656 explorer.exe vssadmin.exe PID 1656 wrote to memory of 916 1656 explorer.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe"C:\Users\Admin\AppData\Local\Temp\1a0b133f8d511e0a78ace8b21056f164199c9e502c6f9013f779a8c2584a2626.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"2⤵
- Drops startup file
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\syswow64\svchost.exe-k netsvcs3⤵
- Modifies data under HKEY_USERS
PID:960
-
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:916
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1292