Analysis
-
max time kernel
152s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 05:01
Static task
static1
Behavioral task
behavioral1
Sample
8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe
Resource
win10v2004-20221111-en
General
-
Target
8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe
-
Size
356KB
-
MD5
4858fb78c4c4129c8f90d5db7d212ae4
-
SHA1
682d27589ebadc5cea5bb9a5a22b9bc70323fca7
-
SHA256
8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0
-
SHA512
130d5287ed44df8a1f6aac80c3eb4a905a55c55a3c63f547ac4f5810955824f0f8f2b3ef0ae1ca3bdc876c9064843281f688db3ad3b0853b899b0b84cbef63f4
-
SSDEEP
3072:GUANCc//////YXTJNDNV3AqS3rm+D7KNB34y2ppFjFS3:zc//////yTJnV3ABr376j2ppFRY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 900 wuauclt.exe 1600 wuauclt.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Windows\\wuauclt.exe" 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wuauclt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Windows\\wuauclt.exe" wuauclt.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 864 set thread context of 548 864 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 27 PID 900 set thread context of 1600 900 wuauclt.exe 30 -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\wuauclt.exe 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe File created C:\Windows\noruns.reg 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe File opened for modification C:\Windows\noruns.reg 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe File created C:\Windows\wuauclt.exe 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe File opened for modification C:\Windows\wuauclt.exe wuauclt.exe File opened for modification C:\Windows\noruns.reg wuauclt.exe File created C:\Windows\wuauclt.exe wuauclt.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 680 sc.exe 1092 sc.exe 472 sc.exe 1244 sc.exe 540 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 936 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 548 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 548 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe 1600 wuauclt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 548 864 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 27 PID 864 wrote to memory of 548 864 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 27 PID 864 wrote to memory of 548 864 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 27 PID 864 wrote to memory of 548 864 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 27 PID 864 wrote to memory of 548 864 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 27 PID 864 wrote to memory of 548 864 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 27 PID 548 wrote to memory of 900 548 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 29 PID 548 wrote to memory of 900 548 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 29 PID 548 wrote to memory of 900 548 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 29 PID 548 wrote to memory of 900 548 8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe 29 PID 900 wrote to memory of 1600 900 wuauclt.exe 30 PID 900 wrote to memory of 1600 900 wuauclt.exe 30 PID 900 wrote to memory of 1600 900 wuauclt.exe 30 PID 900 wrote to memory of 1600 900 wuauclt.exe 30 PID 900 wrote to memory of 1600 900 wuauclt.exe 30 PID 900 wrote to memory of 1600 900 wuauclt.exe 30 PID 1600 wrote to memory of 936 1600 wuauclt.exe 31 PID 1600 wrote to memory of 936 1600 wuauclt.exe 31 PID 1600 wrote to memory of 936 1600 wuauclt.exe 31 PID 1600 wrote to memory of 936 1600 wuauclt.exe 31 PID 1600 wrote to memory of 1460 1600 wuauclt.exe 32 PID 1600 wrote to memory of 1460 1600 wuauclt.exe 32 PID 1600 wrote to memory of 1460 1600 wuauclt.exe 32 PID 1600 wrote to memory of 1460 1600 wuauclt.exe 32 PID 1600 wrote to memory of 396 1600 wuauclt.exe 33 PID 1600 wrote to memory of 396 1600 wuauclt.exe 33 PID 1600 wrote to memory of 396 1600 wuauclt.exe 33 PID 1600 wrote to memory of 396 1600 wuauclt.exe 33 PID 1600 wrote to memory of 680 1600 wuauclt.exe 36 PID 1600 wrote to memory of 680 1600 wuauclt.exe 36 PID 1600 wrote to memory of 680 1600 wuauclt.exe 36 PID 1600 wrote to memory of 680 1600 wuauclt.exe 36 PID 1600 wrote to memory of 1672 1600 wuauclt.exe 38 PID 1600 wrote to memory of 1672 1600 wuauclt.exe 38 PID 1600 wrote to memory of 1672 1600 wuauclt.exe 38 PID 1600 wrote to memory of 1672 1600 wuauclt.exe 38 PID 1460 wrote to memory of 1144 1460 net.exe 41 PID 1460 wrote to memory of 1144 1460 net.exe 41 PID 1460 wrote to memory of 1144 1460 net.exe 41 PID 1460 wrote to memory of 1144 1460 net.exe 41 PID 396 wrote to memory of 1456 396 net.exe 40 PID 396 wrote to memory of 1456 396 net.exe 40 PID 396 wrote to memory of 1456 396 net.exe 40 PID 396 wrote to memory of 1456 396 net.exe 40 PID 1600 wrote to memory of 1092 1600 wuauclt.exe 39 PID 1600 wrote to memory of 1092 1600 wuauclt.exe 39 PID 1600 wrote to memory of 1092 1600 wuauclt.exe 39 PID 1600 wrote to memory of 1092 1600 wuauclt.exe 39 PID 1600 wrote to memory of 1148 1600 wuauclt.exe 43 PID 1600 wrote to memory of 1148 1600 wuauclt.exe 43 PID 1600 wrote to memory of 1148 1600 wuauclt.exe 43 PID 1600 wrote to memory of 1148 1600 wuauclt.exe 43 PID 1600 wrote to memory of 472 1600 wuauclt.exe 46 PID 1600 wrote to memory of 472 1600 wuauclt.exe 46 PID 1600 wrote to memory of 472 1600 wuauclt.exe 46 PID 1600 wrote to memory of 472 1600 wuauclt.exe 46 PID 1148 wrote to memory of 1936 1148 net.exe 49 PID 1148 wrote to memory of 1936 1148 net.exe 49 PID 1148 wrote to memory of 1936 1148 net.exe 49 PID 1148 wrote to memory of 1936 1148 net.exe 49 PID 1600 wrote to memory of 1244 1600 wuauclt.exe 48 PID 1600 wrote to memory of 1244 1600 wuauclt.exe 48 PID 1600 wrote to memory of 1244 1600 wuauclt.exe 48 PID 1600 wrote to memory of 1244 1600 wuauclt.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe"C:\Users\Admin\AppData\Local\Temp\8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exeC:\Users\Admin\AppData\Local\Temp\8ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\wuauclt.exe"C:\Windows\wuauclt.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\wuauclt.exeC:\Windows\wuauclt.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s C:\Windows\noruns.reg5⤵
- Runs .reg file with regedit
PID:936
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess5⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess6⤵PID:1144
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop KVWSC5⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KVWSC6⤵PID:1456
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config KVWSC start= disabled5⤵
- Launches sc.exe
PID:680
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop KVSrvXP5⤵PID:1672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KVSrvXP6⤵PID:1956
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config KVSrvXP start= disabled5⤵
- Launches sc.exe
PID:1092
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop kavsvc5⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop kavsvc6⤵PID:1936
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config kavsvc start= disabled5⤵
- Launches sc.exe
PID:472
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config RsRavMon start= disabled5⤵
- Launches sc.exe
PID:1244
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop RsCCenter5⤵PID:884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RsCCenter6⤵PID:1940
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop RsRavMon5⤵PID:1976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RsRavMon6⤵PID:996
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config RsCCenter start= disabled5⤵
- Launches sc.exe
PID:540
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
356KB
MD54858fb78c4c4129c8f90d5db7d212ae4
SHA1682d27589ebadc5cea5bb9a5a22b9bc70323fca7
SHA2568ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0
SHA512130d5287ed44df8a1f6aac80c3eb4a905a55c55a3c63f547ac4f5810955824f0f8f2b3ef0ae1ca3bdc876c9064843281f688db3ad3b0853b899b0b84cbef63f4
-
Filesize
356KB
MD54858fb78c4c4129c8f90d5db7d212ae4
SHA1682d27589ebadc5cea5bb9a5a22b9bc70323fca7
SHA2568ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0
SHA512130d5287ed44df8a1f6aac80c3eb4a905a55c55a3c63f547ac4f5810955824f0f8f2b3ef0ae1ca3bdc876c9064843281f688db3ad3b0853b899b0b84cbef63f4
-
Filesize
356KB
MD54858fb78c4c4129c8f90d5db7d212ae4
SHA1682d27589ebadc5cea5bb9a5a22b9bc70323fca7
SHA2568ac61b93f7e385b42311b0fab71e21c88451defab6a9035dc3ae587e34ec7dc0
SHA512130d5287ed44df8a1f6aac80c3eb4a905a55c55a3c63f547ac4f5810955824f0f8f2b3ef0ae1ca3bdc876c9064843281f688db3ad3b0853b899b0b84cbef63f4