Analysis
-
max time kernel
19s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe
Resource
win10v2004-20221111-en
General
-
Target
79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe
-
Size
163KB
-
MD5
697d9bff652c1ec020f0f580f8fd58ce
-
SHA1
eb3670c1a0a94558ae85b0815b1d1f7ad4854fa2
-
SHA256
79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954
-
SHA512
bff35b9c1b45881b4c0f836bf9c9a163309b8577d55bd36dcc9def739308e4583e551869fe8cf2c67841968a087638c1857859913a3c2482d9ada75c7282091d
-
SSDEEP
3072:byfKvr1MYnsRqizh52qX3hAwdLe11ac+QZUIOHI0h:9T1MDRFGqX3LA11ac5UTHI0h
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2028 svcr.exe 1180 svcr.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515} svcr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515}\StubPath = "C:\\windows\\svcr.exe" svcr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\svcr.exe" 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\svcr.exe" 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 892 set thread context of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 2028 set thread context of 1180 2028 svcr.exe 30 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\svcr.exe svcr.exe File opened for modification C:\Windows\svcr.exe 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe File created C:\Windows\svcr.exe 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 1180 svcr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1180 svcr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 2028 svcr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 892 wrote to memory of 2036 892 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 27 PID 2036 wrote to memory of 1828 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 28 PID 2036 wrote to memory of 1828 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 28 PID 2036 wrote to memory of 1828 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 28 PID 2036 wrote to memory of 1828 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 28 PID 2036 wrote to memory of 2028 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 29 PID 2036 wrote to memory of 2028 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 29 PID 2036 wrote to memory of 2028 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 29 PID 2036 wrote to memory of 2028 2036 79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe 29 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 2028 wrote to memory of 1180 2028 svcr.exe 30 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31 PID 1180 wrote to memory of 580 1180 svcr.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe"C:\Users\Admin\AppData\Local\Temp\79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exeC:\Users\Admin\AppData\Local\Temp\79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE3⤵PID:1828
-
-
C:\Windows\svcr.exe"C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\79e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\svcr.exeC:\Windows\svcr.exe4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\NOTEPAD.EXENOTEPAD.EXE5⤵PID:580
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD5697d9bff652c1ec020f0f580f8fd58ce
SHA1eb3670c1a0a94558ae85b0815b1d1f7ad4854fa2
SHA25679e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954
SHA512bff35b9c1b45881b4c0f836bf9c9a163309b8577d55bd36dcc9def739308e4583e551869fe8cf2c67841968a087638c1857859913a3c2482d9ada75c7282091d
-
Filesize
163KB
MD5697d9bff652c1ec020f0f580f8fd58ce
SHA1eb3670c1a0a94558ae85b0815b1d1f7ad4854fa2
SHA25679e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954
SHA512bff35b9c1b45881b4c0f836bf9c9a163309b8577d55bd36dcc9def739308e4583e551869fe8cf2c67841968a087638c1857859913a3c2482d9ada75c7282091d
-
Filesize
163KB
MD5697d9bff652c1ec020f0f580f8fd58ce
SHA1eb3670c1a0a94558ae85b0815b1d1f7ad4854fa2
SHA25679e3ea95bf4e0314af4e9c8ea4864af0cf24be61f252c3ec765667f9f37ac954
SHA512bff35b9c1b45881b4c0f836bf9c9a163309b8577d55bd36dcc9def739308e4583e551869fe8cf2c67841968a087638c1857859913a3c2482d9ada75c7282091d