Analysis
-
max time kernel
152s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 01:09
Static task
static1
Behavioral task
behavioral1
Sample
021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe
Resource
win10v2004-20220812-en
General
-
Target
021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe
-
Size
68KB
-
MD5
a104334f091fba128807dcf115819720
-
SHA1
ab4dee275193e7a0f2a19f71cfc6d0f69692f424
-
SHA256
021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0
-
SHA512
bda7359cc600a26a40f252ff52f36a83605de71adef15c87c4a0fb4cfb5d2f2b1ae633b4549aceaedfa6a69101bdab32571bea2eb283f553a14ae2faf036e34e
-
SSDEEP
768:rdsv/UDO00cfykvw8qqOve3ZVrt2F0mv9PIKr5LQ6hZDyVYUv5m/668OWQHYNnds:qeO00cdVrMFjdF5L7hov5Ex4Br+KkCKT
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt SP00LSV.EXE -
Executes dropped EXE 3 IoCs
pid Process 1120 winlog.exe 1864 SP00LSV.EXE 1380 SVCH0ST.EXE -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E}\winlog.EXE SP00LSV.EXE File opened for modification C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E}\winlog.EXE SP00LSV.EXE File opened for modification C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E} SP00LSV.EXE File opened for modification C:\Windows\winlog.EXE 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe File opened for modification C:\Windows\SP00LSV.EXE winlog.exe File created C:\Windows\SVCH0ST.EXE SP00LSV.EXE File opened for modification C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe SP00LSV.EXE File created C:\Windows\winlog.EXE 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe File opened for modification C:\Windows\SVCH0ST.EXE SP00LSV.EXE File created C:\Windows\Recycled.{645FF040-5081-101B-9F08-00AA002F954E}\system.exe SP00LSV.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\ = "open" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chm.file\shell\open\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inifile\shell\open\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\command SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\ = "??(&O) " SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\open\command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shell\explore\ = "?????(&X) " SP00LSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vbsfile\shell\open\command SP00LSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "C:\\Windows\\winlog.EXE %1" SP00LSV.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1864 SP00LSV.EXE 1864 SP00LSV.EXE 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1120 winlog.exe 1120 winlog.exe 1380 SVCH0ST.EXE 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1864 SP00LSV.EXE 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1380 SVCH0ST.EXE 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1864 SP00LSV.EXE 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1864 SP00LSV.EXE 1120 winlog.exe 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1380 SVCH0ST.EXE 1120 winlog.exe 1120 winlog.exe 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1864 SP00LSV.EXE 1120 winlog.exe 1864 SP00LSV.EXE 1380 SVCH0ST.EXE 1380 SVCH0ST.EXE 1120 winlog.exe 1120 winlog.exe 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1120 winlog.exe 1380 SVCH0ST.EXE 1864 SP00LSV.EXE 1380 SVCH0ST.EXE 1864 SP00LSV.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1864 SP00LSV.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1444 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 1120 winlog.exe 1864 SP00LSV.EXE 1380 SVCH0ST.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1120 1444 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 27 PID 1444 wrote to memory of 1120 1444 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 27 PID 1444 wrote to memory of 1120 1444 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 27 PID 1444 wrote to memory of 1120 1444 021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe 27 PID 1120 wrote to memory of 1864 1120 winlog.exe 28 PID 1120 wrote to memory of 1864 1120 winlog.exe 28 PID 1120 wrote to memory of 1864 1120 winlog.exe 28 PID 1120 wrote to memory of 1864 1120 winlog.exe 28 PID 1864 wrote to memory of 1380 1864 SP00LSV.EXE 29 PID 1864 wrote to memory of 1380 1864 SP00LSV.EXE 29 PID 1864 wrote to memory of 1380 1864 SP00LSV.EXE 29 PID 1864 wrote to memory of 1380 1864 SP00LSV.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe"C:\Users\Admin\AppData\Local\Temp\021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\winlog.exe"C:\Windows\winlog.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SP00LSV.EXE"C:\Windows\SP00LSV.EXE"3⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SVCH0ST.EXE"C:\Windows\SVCH0ST.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1380
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5836d2fa36f768019167b6ac48f58bdad
SHA19e5ed6d4c78c64a09c8c1804f0c68ae0b225ad1b
SHA2569b387db163f089f6ed9700a96c49899edf59d20a2215d9e4970601eb905f2c72
SHA512774563e0d923f2dffa82b7f14d07bf318b7845398aa384d8a278693a67cf548754c3288e92a4f5d339aecc90484e6a87b0eea7abf59a89918cc37148edb8a102
-
Filesize
19KB
MD5836d2fa36f768019167b6ac48f58bdad
SHA19e5ed6d4c78c64a09c8c1804f0c68ae0b225ad1b
SHA2569b387db163f089f6ed9700a96c49899edf59d20a2215d9e4970601eb905f2c72
SHA512774563e0d923f2dffa82b7f14d07bf318b7845398aa384d8a278693a67cf548754c3288e92a4f5d339aecc90484e6a87b0eea7abf59a89918cc37148edb8a102
-
Filesize
19KB
MD5836d2fa36f768019167b6ac48f58bdad
SHA19e5ed6d4c78c64a09c8c1804f0c68ae0b225ad1b
SHA2569b387db163f089f6ed9700a96c49899edf59d20a2215d9e4970601eb905f2c72
SHA512774563e0d923f2dffa82b7f14d07bf318b7845398aa384d8a278693a67cf548754c3288e92a4f5d339aecc90484e6a87b0eea7abf59a89918cc37148edb8a102
-
Filesize
68KB
MD5a104334f091fba128807dcf115819720
SHA1ab4dee275193e7a0f2a19f71cfc6d0f69692f424
SHA256021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0
SHA512bda7359cc600a26a40f252ff52f36a83605de71adef15c87c4a0fb4cfb5d2f2b1ae633b4549aceaedfa6a69101bdab32571bea2eb283f553a14ae2faf036e34e
-
Filesize
68KB
MD5a104334f091fba128807dcf115819720
SHA1ab4dee275193e7a0f2a19f71cfc6d0f69692f424
SHA256021c586a2cd7d499d6ad5cf59e8f0d5d2babea0a061bb05e3ba07acd24adf8c0
SHA512bda7359cc600a26a40f252ff52f36a83605de71adef15c87c4a0fb4cfb5d2f2b1ae633b4549aceaedfa6a69101bdab32571bea2eb283f553a14ae2faf036e34e