Analysis
-
max time kernel
139s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 18:26
Static task
static1
Behavioral task
behavioral1
Sample
e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe
Resource
win10v2004-20220812-en
General
-
Target
e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe
-
Size
730KB
-
MD5
28d8cdbaef107da7a4670c80a9dc91d9
-
SHA1
ece9bf576f8f458850b8ad48db034690e4ab529e
-
SHA256
e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3
-
SHA512
208d1a51d216d81b01b2ccd9323a7c1066aae2e1b511fc915ce82e5b3973656e1fb445e1ed5fffccc4cbc546214da7aeb77b0fe15f993608b63cf59c99413106
-
SSDEEP
12288:cRWNcr8oxncLH0BYXEZyXNbUQI6YrZdzL0wArkRhA6cfUGpXWO4GQQcWcCK7MY2n:3NBIcrctodbUl1larAhA9UsWtGs9Mlnn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svn.exesvn.exepid process 1584 svn.exe 1788 svn.exe -
Loads dropped DLL 4 IoCs
Processes:
WScript.exesvn.exepid process 392 WScript.exe 392 WScript.exe 1584 svn.exe 1584 svn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1560 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
svn.exepid process 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe 1584 svn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svn.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1584 svn.exe Token: SeDebugPrivilege 1560 taskkill.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exeWScript.exesvn.exeWScript.execmd.exedescription pid process target process PID 2000 wrote to memory of 392 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 392 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 392 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 392 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 392 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 392 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 392 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 392 wrote to memory of 1584 392 WScript.exe svn.exe PID 392 wrote to memory of 1584 392 WScript.exe svn.exe PID 392 wrote to memory of 1584 392 WScript.exe svn.exe PID 392 wrote to memory of 1584 392 WScript.exe svn.exe PID 392 wrote to memory of 1584 392 WScript.exe svn.exe PID 392 wrote to memory of 1584 392 WScript.exe svn.exe PID 392 wrote to memory of 1584 392 WScript.exe svn.exe PID 1584 wrote to memory of 1788 1584 svn.exe svn.exe PID 1584 wrote to memory of 1788 1584 svn.exe svn.exe PID 1584 wrote to memory of 1788 1584 svn.exe svn.exe PID 1584 wrote to memory of 1788 1584 svn.exe svn.exe PID 1584 wrote to memory of 1788 1584 svn.exe svn.exe PID 1584 wrote to memory of 1788 1584 svn.exe svn.exe PID 1584 wrote to memory of 1788 1584 svn.exe svn.exe PID 1584 wrote to memory of 1660 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1660 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1660 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1660 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1912 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1912 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1912 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1912 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1908 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1908 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1908 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1908 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1292 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1292 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1292 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1292 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1436 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1436 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1436 1584 svn.exe explorer.exe PID 1584 wrote to memory of 1436 1584 svn.exe explorer.exe PID 2000 wrote to memory of 1792 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 1792 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 1792 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 1792 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 1792 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 1792 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 2000 wrote to memory of 1792 2000 e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe WScript.exe PID 1792 wrote to memory of 1608 1792 WScript.exe cmd.exe PID 1792 wrote to memory of 1608 1792 WScript.exe cmd.exe PID 1792 wrote to memory of 1608 1792 WScript.exe cmd.exe PID 1792 wrote to memory of 1608 1792 WScript.exe cmd.exe PID 1792 wrote to memory of 1608 1792 WScript.exe cmd.exe PID 1792 wrote to memory of 1608 1792 WScript.exe cmd.exe PID 1792 wrote to memory of 1608 1792 WScript.exe cmd.exe PID 1608 wrote to memory of 1560 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1560 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1560 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1560 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1560 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1560 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1560 1608 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe"C:\Users\Admin\AppData\Local\Temp\e83dad3415ee3ca0b095f78619f6cd578ae86c7672e6a0c28270bbd6cfcdc3d3.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\kl.vbs"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exe"4⤵
- Executes dropped EXE
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\bat.vbs"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\k.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im svn.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\bat.vbsFilesize
71B
MD504805c1c61d899d44639589c0049c5ef
SHA1a43efd5588aca4dfb09eeb87924877095715eea1
SHA256f3215aea801adbc9633e1d471d3b1e1d1cb2bfcf517f95c87a8693fb7aa82b9b
SHA5129400ef0ac810305f12d03f5a5eced1c3e208e2bdc1fa2be7cd3e6576354b4200890b542313a885d9aef4aff6de9d9509686566923b9d86350c2eac7c7c2f9c5c
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\k.batFilesize
23B
MD557a999f78f7d52d9226723ebd854fd05
SHA121bc46100d995eebe8585fb49792478a7861f6ec
SHA2564c28eb1586f6dd060a1a4d30cb63abeef0d22eabab370a098c6d28d715a32363
SHA512dd7f89364dfd1c80507b4d2eef7d8975afa9bdcf0f6fd4cd3d199be6f26d31da2375e04e715c6234fdcd6ac723545c982e1ec20b9c5cc76532d331821865d988
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\kl.vbsFilesize
50B
MD5a480ea8e530c95808c8cb4d5f2d8b9ac
SHA106dc46329ba1ea630636f0dab1138a7747db35f3
SHA2568fb204973876b2c69eacd2878e40164183fc629437a7dad17c763b8b92430e4f
SHA5126e831a826fb5ea908f5ac5d39f287f9acb6c419669ebb2a2e54f011eb05b6eeaf9699d245f96d6a31eb2b10aeb49e60f8d1021cd98cbc220c007730f99a77816
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exeFilesize
824KB
MD579e43a8b49465a118c03c88f232353b5
SHA1c921090091e89b954248d900caa843241588f745
SHA25600a9d4151baad17a03bc2c6331f0c10cb4c1dcd578ee9ba6b56fde000a8cbdf4
SHA512548f19bf8edc2655de135918dd0f5a58c49d226765c231cdc8c1d5e8173874cb833d5859d3eb19099e184b02f67bccc91910a5d815b4f4c0315ab1778d40fc72
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exeFilesize
824KB
MD579e43a8b49465a118c03c88f232353b5
SHA1c921090091e89b954248d900caa843241588f745
SHA25600a9d4151baad17a03bc2c6331f0c10cb4c1dcd578ee9ba6b56fde000a8cbdf4
SHA512548f19bf8edc2655de135918dd0f5a58c49d226765c231cdc8c1d5e8173874cb833d5859d3eb19099e184b02f67bccc91910a5d815b4f4c0315ab1778d40fc72
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exeFilesize
824KB
MD579e43a8b49465a118c03c88f232353b5
SHA1c921090091e89b954248d900caa843241588f745
SHA25600a9d4151baad17a03bc2c6331f0c10cb4c1dcd578ee9ba6b56fde000a8cbdf4
SHA512548f19bf8edc2655de135918dd0f5a58c49d226765c231cdc8c1d5e8173874cb833d5859d3eb19099e184b02f67bccc91910a5d815b4f4c0315ab1778d40fc72
-
\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exeFilesize
824KB
MD579e43a8b49465a118c03c88f232353b5
SHA1c921090091e89b954248d900caa843241588f745
SHA25600a9d4151baad17a03bc2c6331f0c10cb4c1dcd578ee9ba6b56fde000a8cbdf4
SHA512548f19bf8edc2655de135918dd0f5a58c49d226765c231cdc8c1d5e8173874cb833d5859d3eb19099e184b02f67bccc91910a5d815b4f4c0315ab1778d40fc72
-
\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exeFilesize
824KB
MD579e43a8b49465a118c03c88f232353b5
SHA1c921090091e89b954248d900caa843241588f745
SHA25600a9d4151baad17a03bc2c6331f0c10cb4c1dcd578ee9ba6b56fde000a8cbdf4
SHA512548f19bf8edc2655de135918dd0f5a58c49d226765c231cdc8c1d5e8173874cb833d5859d3eb19099e184b02f67bccc91910a5d815b4f4c0315ab1778d40fc72
-
\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exeFilesize
824KB
MD579e43a8b49465a118c03c88f232353b5
SHA1c921090091e89b954248d900caa843241588f745
SHA25600a9d4151baad17a03bc2c6331f0c10cb4c1dcd578ee9ba6b56fde000a8cbdf4
SHA512548f19bf8edc2655de135918dd0f5a58c49d226765c231cdc8c1d5e8173874cb833d5859d3eb19099e184b02f67bccc91910a5d815b4f4c0315ab1778d40fc72
-
\Users\Admin\AppData\Local\Temp\RarSFX0\svn.exeFilesize
824KB
MD579e43a8b49465a118c03c88f232353b5
SHA1c921090091e89b954248d900caa843241588f745
SHA25600a9d4151baad17a03bc2c6331f0c10cb4c1dcd578ee9ba6b56fde000a8cbdf4
SHA512548f19bf8edc2655de135918dd0f5a58c49d226765c231cdc8c1d5e8173874cb833d5859d3eb19099e184b02f67bccc91910a5d815b4f4c0315ab1778d40fc72
-
memory/392-55-0x0000000000000000-mapping.dmp
-
memory/1560-75-0x0000000000000000-mapping.dmp
-
memory/1584-64-0x0000000073800000-0x0000000073DAB000-memory.dmpFilesize
5.7MB
-
memory/1584-68-0x0000000073800000-0x0000000073DAB000-memory.dmpFilesize
5.7MB
-
memory/1584-61-0x0000000000000000-mapping.dmp
-
memory/1608-73-0x0000000000000000-mapping.dmp
-
memory/1792-69-0x0000000000000000-mapping.dmp
-
memory/2000-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmpFilesize
8KB