Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 03:35
Static task
static1
Behavioral task
behavioral1
Sample
6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe
Resource
win10v2004-20221111-en
General
-
Target
6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe
-
Size
180KB
-
MD5
11228d041ea74807cf6e28976b842db7
-
SHA1
016814ebbf000c216d10b185c2b79cd51be79696
-
SHA256
6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153
-
SHA512
3358daa7f26434e265b3ca173804a51d105fff43d63b3f18913c18b17003705e69860514d2839cdd83ea81f15fc1edbdde165262eac3265b69fdec14b9ab133f
-
SSDEEP
3072:bvUbnMDcnVGgkqsA4vowyVRyA7W0SJVH5FqQ117:rUbnuchz4vuitJVH5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 928 system.exe 1028 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 12 IoCs
pid Process 1000 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe 1000 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe 2024 Rundll32.exe 2024 Rundll32.exe 2024 Rundll32.exe 2024 Rundll32.exe 1672 Rundll32.exe 1672 Rundll32.exe 1672 Rundll32.exe 1672 Rundll32.exe 1672 Rundll32.exe 1000 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\system32\\system.exe" Rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: Rundll32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.exe 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe File created C:\Windows\SysWOW64\faqgmw.dll system.exe File created C:\Windows\SysWOW64\ecchmw.dll system.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\AAV\CDriver.sys Rundll32.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 588 sc.exe 536 sc.exe 1196 sc.exe 1928 sc.exe 1216 sc.exe 1072 sc.exe 344 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2024 Rundll32.exe 2024 Rundll32.exe 2024 Rundll32.exe 2024 Rundll32.exe 2024 Rundll32.exe 2024 Rundll32.exe 2024 Rundll32.exe 1672 Rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1000 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1028 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1028 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1028 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe 1028 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1000 wrote to memory of 928 1000 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe 27 PID 1000 wrote to memory of 928 1000 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe 27 PID 1000 wrote to memory of 928 1000 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe 27 PID 1000 wrote to memory of 928 1000 6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe 27 PID 928 wrote to memory of 2024 928 system.exe 28 PID 928 wrote to memory of 2024 928 system.exe 28 PID 928 wrote to memory of 2024 928 system.exe 28 PID 928 wrote to memory of 2024 928 system.exe 28 PID 928 wrote to memory of 2024 928 system.exe 28 PID 928 wrote to memory of 2024 928 system.exe 28 PID 928 wrote to memory of 2024 928 system.exe 28 PID 2024 wrote to memory of 812 2024 Rundll32.exe 29 PID 2024 wrote to memory of 812 2024 Rundll32.exe 29 PID 2024 wrote to memory of 812 2024 Rundll32.exe 29 PID 2024 wrote to memory of 812 2024 Rundll32.exe 29 PID 2024 wrote to memory of 1328 2024 Rundll32.exe 30 PID 2024 wrote to memory of 1328 2024 Rundll32.exe 30 PID 2024 wrote to memory of 1328 2024 Rundll32.exe 30 PID 2024 wrote to memory of 1328 2024 Rundll32.exe 30 PID 2024 wrote to memory of 344 2024 Rundll32.exe 33 PID 2024 wrote to memory of 344 2024 Rundll32.exe 33 PID 2024 wrote to memory of 344 2024 Rundll32.exe 33 PID 2024 wrote to memory of 344 2024 Rundll32.exe 33 PID 2024 wrote to memory of 588 2024 Rundll32.exe 36 PID 2024 wrote to memory of 588 2024 Rundll32.exe 36 PID 2024 wrote to memory of 588 2024 Rundll32.exe 36 PID 2024 wrote to memory of 588 2024 Rundll32.exe 36 PID 2024 wrote to memory of 536 2024 Rundll32.exe 37 PID 2024 wrote to memory of 536 2024 Rundll32.exe 37 PID 2024 wrote to memory of 536 2024 Rundll32.exe 37 PID 2024 wrote to memory of 536 2024 Rundll32.exe 37 PID 2024 wrote to memory of 1196 2024 Rundll32.exe 38 PID 2024 wrote to memory of 1196 2024 Rundll32.exe 38 PID 2024 wrote to memory of 1196 2024 Rundll32.exe 38 PID 2024 wrote to memory of 1196 2024 Rundll32.exe 38 PID 2024 wrote to memory of 1216 2024 Rundll32.exe 43 PID 2024 wrote to memory of 1216 2024 Rundll32.exe 43 PID 2024 wrote to memory of 1216 2024 Rundll32.exe 43 PID 2024 wrote to memory of 1216 2024 Rundll32.exe 43 PID 2024 wrote to memory of 1928 2024 Rundll32.exe 41 PID 2024 wrote to memory of 1928 2024 Rundll32.exe 41 PID 2024 wrote to memory of 1928 2024 Rundll32.exe 41 PID 2024 wrote to memory of 1928 2024 Rundll32.exe 41 PID 2024 wrote to memory of 1000 2024 Rundll32.exe 26 PID 2024 wrote to memory of 1000 2024 Rundll32.exe 26 PID 2024 wrote to memory of 928 2024 Rundll32.exe 27 PID 2024 wrote to memory of 928 2024 Rundll32.exe 27 PID 2024 wrote to memory of 812 2024 Rundll32.exe 29 PID 2024 wrote to memory of 812 2024 Rundll32.exe 29 PID 2024 wrote to memory of 1328 2024 Rundll32.exe 30 PID 2024 wrote to memory of 1328 2024 Rundll32.exe 30 PID 2024 wrote to memory of 344 2024 Rundll32.exe 33 PID 2024 wrote to memory of 344 2024 Rundll32.exe 33 PID 2024 wrote to memory of 536 2024 Rundll32.exe 37 PID 2024 wrote to memory of 536 2024 Rundll32.exe 37 PID 2024 wrote to memory of 1196 2024 Rundll32.exe 38 PID 2024 wrote to memory of 1196 2024 Rundll32.exe 38 PID 2024 wrote to memory of 1216 2024 Rundll32.exe 43 PID 2024 wrote to memory of 1216 2024 Rundll32.exe 43 PID 812 wrote to memory of 1668 812 net.exe 46 PID 812 wrote to memory of 1668 812 net.exe 46 PID 812 wrote to memory of 1668 812 net.exe 46 PID 812 wrote to memory of 1668 812 net.exe 46 PID 1328 wrote to memory of 1952 1328 net.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe"C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\faqgmw.dll Exbcute3⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\net.exenet stop WinDefend4⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend5⤵PID:1668
-
-
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc4⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc5⤵PID:1952
-
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled4⤵
- Launches sc.exe
PID:344
-
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled4⤵
- Launches sc.exe
PID:588
-
-
C:\Windows\SysWOW64\sc.exesc stop ZhuDongFangYu4⤵
- Launches sc.exe
PID:536
-
-
C:\Windows\SysWOW64\sc.exesc delete ZhuDongFangYu4⤵
- Launches sc.exe
PID:1196
-
-
C:\Windows\SysWOW64\sc.exesc delete 360rp4⤵
- Launches sc.exe
PID:1928
-
-
C:\Windows\SysWOW64\sc.exesc stop 360rp4⤵
- Launches sc.exe
PID:1216
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" stop PolicyAgent4⤵
- Launches sc.exe
PID:1072
-
-
-
C:\Windows\SysWOW64\Rundll32.exeRundll32 C:\Windows\system32\ecchmw.dll Exbcute3⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
-
C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exeC:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe
Filesize28KB
MD5e197c221c103e06a0769e83fb6f8ccf0
SHA191e0aae428ed1ce89293dcbb51f4e648baf9f801
SHA2565d3f13d9bf1a6b0566216b46c93fb0a5aeb3f1d55a1ce1a7548482b1c34d43ed
SHA5124ebf4dfc0df262fb61340f27706d2ee5761a340259e542f4b97d9cd241cfb7a28d34a5cbacfb4f4534505aabd602c9af0cc66055b72c91af9a70fe3cac40e548
-
Filesize
24KB
MD59ff4fef4569fa53b7f552cc2cbc70861
SHA15cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e
SHA256df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97
SHA51211e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b
-
Filesize
75KB
MD5ad560c9ffe18b4d015d97f33288c7444
SHA18dc0f8f4d174587506e657ee624887da4dab5995
SHA2562e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574
SHA5129369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551
-
Filesize
142KB
MD54a758f52dcab4ab7557bcb0de47fa5ff
SHA1556f7de6f5d15ae45e8602fae269c94bc7919491
SHA25675e7148f77faf32a30662ce62d2f6676478add52522842c193e9ed35d9de66a0
SHA5124234905c4d6c57e31b2f6b44010563cc39090cf589beaf53ef4754edfa7f65a5d253d8622853c7edc65e18e648b9392f38e05ecdae99e48001a0ff5dab5ec3f9
-
Filesize
142KB
MD54a758f52dcab4ab7557bcb0de47fa5ff
SHA1556f7de6f5d15ae45e8602fae269c94bc7919491
SHA25675e7148f77faf32a30662ce62d2f6676478add52522842c193e9ed35d9de66a0
SHA5124234905c4d6c57e31b2f6b44010563cc39090cf589beaf53ef4754edfa7f65a5d253d8622853c7edc65e18e648b9392f38e05ecdae99e48001a0ff5dab5ec3f9
-
Filesize
1.7MB
MD5b5eb5bd3066959611e1f7a80fd6cc172
SHA16fb1532059212c840737b3f923a9c0b152c0887a
SHA2561ffb68a66f28f604adcae9c135f8dcf301316ab7fda8ebd294583c56dd26f7cc
SHA5126c0743e0ff4922e859ba66b68040ab994dbae33e80c63ce8c993ad31a0c7aad6c6467484da1550063214953cd641dbf597438dd0c02f24164505d88ca80ea1b6
-
\Users\Admin\AppData\Local\Temp\6e61e264fc5e2d5e79d6716def791f5e768c0c691d92fe509d27b6f6884fa153.exe
Filesize28KB
MD5e197c221c103e06a0769e83fb6f8ccf0
SHA191e0aae428ed1ce89293dcbb51f4e648baf9f801
SHA2565d3f13d9bf1a6b0566216b46c93fb0a5aeb3f1d55a1ce1a7548482b1c34d43ed
SHA5124ebf4dfc0df262fb61340f27706d2ee5761a340259e542f4b97d9cd241cfb7a28d34a5cbacfb4f4534505aabd602c9af0cc66055b72c91af9a70fe3cac40e548
-
Filesize
24KB
MD59ff4fef4569fa53b7f552cc2cbc70861
SHA15cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e
SHA256df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97
SHA51211e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b
-
Filesize
24KB
MD59ff4fef4569fa53b7f552cc2cbc70861
SHA15cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e
SHA256df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97
SHA51211e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b
-
Filesize
24KB
MD59ff4fef4569fa53b7f552cc2cbc70861
SHA15cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e
SHA256df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97
SHA51211e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b
-
Filesize
24KB
MD59ff4fef4569fa53b7f552cc2cbc70861
SHA15cb6537fedabcd0bfc62a4e8cdb5d27a61a1bb8e
SHA256df7f78a1f7324d1014f1b7b83337d41f5141451564ea33a8e10028b0602c3d97
SHA51211e1119804120d984a94e9933f8296ac085c74b4a32aa6cdfd5472c8bb47d872ecf7cddc01d3681392d86ed929870203221cac74cffe807206b0bacb353f896b
-
Filesize
75KB
MD5ad560c9ffe18b4d015d97f33288c7444
SHA18dc0f8f4d174587506e657ee624887da4dab5995
SHA2562e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574
SHA5129369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551
-
Filesize
75KB
MD5ad560c9ffe18b4d015d97f33288c7444
SHA18dc0f8f4d174587506e657ee624887da4dab5995
SHA2562e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574
SHA5129369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551
-
Filesize
75KB
MD5ad560c9ffe18b4d015d97f33288c7444
SHA18dc0f8f4d174587506e657ee624887da4dab5995
SHA2562e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574
SHA5129369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551
-
Filesize
75KB
MD5ad560c9ffe18b4d015d97f33288c7444
SHA18dc0f8f4d174587506e657ee624887da4dab5995
SHA2562e04a72897eb14437bb81c5cd785b84c7c42c901230719d3630b9c2b359b3574
SHA5129369ea6eb8d54952c58a95d6d513487f89f5d948604b29366160c28319f575736dfe5041b26c030aa6c3f99f1af1e8ed63271bcaf0279fbed97971583d23d551
-
Filesize
142KB
MD54a758f52dcab4ab7557bcb0de47fa5ff
SHA1556f7de6f5d15ae45e8602fae269c94bc7919491
SHA25675e7148f77faf32a30662ce62d2f6676478add52522842c193e9ed35d9de66a0
SHA5124234905c4d6c57e31b2f6b44010563cc39090cf589beaf53ef4754edfa7f65a5d253d8622853c7edc65e18e648b9392f38e05ecdae99e48001a0ff5dab5ec3f9
-
Filesize
142KB
MD54a758f52dcab4ab7557bcb0de47fa5ff
SHA1556f7de6f5d15ae45e8602fae269c94bc7919491
SHA25675e7148f77faf32a30662ce62d2f6676478add52522842c193e9ed35d9de66a0
SHA5124234905c4d6c57e31b2f6b44010563cc39090cf589beaf53ef4754edfa7f65a5d253d8622853c7edc65e18e648b9392f38e05ecdae99e48001a0ff5dab5ec3f9