Analysis

  • max time kernel
    185s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 09:07

General

  • Target

    18e8ffc586d4922185406bb0a64612c2128de50b76786729145b5a774c00b5c2.exe

  • Size

    932KB

  • MD5

    ec09d55e2054d289f1aa138382c83f4a

  • SHA1

    c8e01f6036deededf8c52d1b600b307b0829c81a

  • SHA256

    18e8ffc586d4922185406bb0a64612c2128de50b76786729145b5a774c00b5c2

  • SHA512

    aba623c1a41445e197cde6eff18f17838b8a1d6e8488ca4264a9f9f9f8bdd07e1ccf5d0ed809354a0dc7ece79dee3c9fda48ec9ebd8fdc0204b4ab502795e2ec

  • SSDEEP

    12288:M/sJFtFjMkihXnREUMJAIOoHuRBg3OLtjUWFIOpftASG9tRquNLe1J0MC1Y:M/gtlMkiXREzJTOF+NOxtA9tRNLe1e3Y

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18e8ffc586d4922185406bb0a64612c2128de50b76786729145b5a774c00b5c2.exe
    "C:\Users\Admin\AppData\Local\Temp\18e8ffc586d4922185406bb0a64612c2128de50b76786729145b5a774c00b5c2.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\SysWOW64\sc.exe
      sc.exe Create "COMEventn" type= own type= interact start= auto DisplayName= "COM++ Event System32" binPath= "cmd.exe /c start "C:\Windows\\Svchost.exe"
      2⤵
      • Launches sc.exe
      PID:596
    • C:\Windows\SysWOW64\sc.exe
      sc.exe description "COMEventn" Ö§³Öϵͳʼþ֪ͨ·þÎñ(SENS)£¬´Ë·þÎñΪ¶©ÔÄ×é'¼þ¶ÔÏóÄ£ÐÍ(COM)×é¼þʼþÌṩ×Ô¶¯·Ö²¼¹¦ÄÜ
      2⤵
      • Launches sc.exe
      PID:296
    • C:\Windows\Svchost.exe
      C:\Windows\\Svchost.exe
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:752

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

New Service

1
T1050

Privilege Escalation

New Service

1
T1050

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Svchost.exe
    Filesize

    10.9MB

    MD5

    bee22806cf7e67c1300707c9ad9086d2

    SHA1

    13966159c8f66da48d6827f7dbcfbf973bf9fa5e

    SHA256

    a70ee15c4c7692753a5d65525a1f29508dc9f8bf4611171df488490ca3fcf2b7

    SHA512

    ad87c669a422972e12a2835981dc0259de705fecc61364d462f4797edcd098cb3f7b1def68c296ee902e555730765a71d6d240e1d62e4323f21cafa9118673d6

  • C:\Windows\Svchost.exe
    Filesize

    10.9MB

    MD5

    bee22806cf7e67c1300707c9ad9086d2

    SHA1

    13966159c8f66da48d6827f7dbcfbf973bf9fa5e

    SHA256

    a70ee15c4c7692753a5d65525a1f29508dc9f8bf4611171df488490ca3fcf2b7

    SHA512

    ad87c669a422972e12a2835981dc0259de705fecc61364d462f4797edcd098cb3f7b1def68c296ee902e555730765a71d6d240e1d62e4323f21cafa9118673d6

  • memory/296-56-0x0000000000000000-mapping.dmp
  • memory/596-55-0x0000000000000000-mapping.dmp
  • memory/752-57-0x0000000000000000-mapping.dmp
  • memory/1252-54-0x00000000760D1000-0x00000000760D3000-memory.dmp
    Filesize

    8KB