Analysis
-
max time kernel
106s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 07:03
Behavioral task
behavioral1
Sample
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe
Resource
win7-20220812-en
General
-
Target
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe
-
Size
919KB
-
MD5
460f7f13dcf4910c982fbd2faaf4b9f7
-
SHA1
93f37b5851afa3be62abff689c275fd905e17779
-
SHA256
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58
-
SHA512
6d5aeaaf82faa5b0b4d11bc10e0fa65294876724f8d9629a2f619368c517449bfb7e725006b725d30134e9da5fa84f27888252b72a2a7555f62138a005e8735e
-
SSDEEP
24576:A4rA2sfoujTvsJ0RxhK2fZ++GkNtRFEDw7fzU9BVzKTc:AqFaxhKowpkNtRFEUjgPVzoc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svcr.exepid process 1348 svcr.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
svcr.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515}\StubPath = "C:\\windows\\svcr.exe" svcr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515} svcr.exe -
Deletes itself 1 IoCs
Processes:
svcr.exepid process 1348 svcr.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exesvcr.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine svcr.exe -
Processes:
resource yara_rule behavioral1/memory/780-55-0x0000000000400000-0x00000000004F4000-memory.dmp themida C:\Windows\svcr.exe themida behavioral1/memory/780-58-0x0000000000400000-0x00000000004F4000-memory.dmp themida C:\Windows\svcr.exe themida behavioral1/memory/1348-61-0x0000000000400000-0x00000000004F4000-memory.dmp themida behavioral1/memory/1348-70-0x0000000000400000-0x00000000004F4000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\svcr.exe" 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\svcr.exe" 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exesvcr.exepid process 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe 1348 svcr.exe -
Drops file in Windows directory 2 IoCs
Processes:
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exedescription ioc process File opened for modification C:\Windows\svcr.exe 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe File created C:\Windows\svcr.exe 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
IEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{679F5CE1-70A7-11ED-9AD4-7A3897842414} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376574964" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exesvcr.exepid process 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe 1348 svcr.exe 1348 svcr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svcr.exedescription pid process Token: SeDebugPrivilege 1348 svcr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
IEXPLORE.EXEpid process 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 768 IEXPLORE.EXE 768 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 976 IEXPLORE.EXE 976 IEXPLORE.EXE 976 IEXPLORE.EXE 976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exeIEXPLORE.EXEIEXPLORE.EXEsvcr.exeIEXPLORE.EXEdescription pid process target process PID 780 wrote to memory of 1804 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe IEXPLORE.EXE PID 780 wrote to memory of 1804 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe IEXPLORE.EXE PID 780 wrote to memory of 1804 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe IEXPLORE.EXE PID 780 wrote to memory of 1804 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe IEXPLORE.EXE PID 1804 wrote to memory of 2004 1804 IEXPLORE.EXE IEXPLORE.EXE PID 1804 wrote to memory of 2004 1804 IEXPLORE.EXE IEXPLORE.EXE PID 1804 wrote to memory of 2004 1804 IEXPLORE.EXE IEXPLORE.EXE PID 1804 wrote to memory of 2004 1804 IEXPLORE.EXE IEXPLORE.EXE PID 2004 wrote to memory of 768 2004 IEXPLORE.EXE IEXPLORE.EXE PID 2004 wrote to memory of 768 2004 IEXPLORE.EXE IEXPLORE.EXE PID 2004 wrote to memory of 768 2004 IEXPLORE.EXE IEXPLORE.EXE PID 2004 wrote to memory of 768 2004 IEXPLORE.EXE IEXPLORE.EXE PID 780 wrote to memory of 1348 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe svcr.exe PID 780 wrote to memory of 1348 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe svcr.exe PID 780 wrote to memory of 1348 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe svcr.exe PID 780 wrote to memory of 1348 780 8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe svcr.exe PID 1348 wrote to memory of 1768 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1768 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1768 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1768 1348 svcr.exe IEXPLORE.EXE PID 1768 wrote to memory of 1668 1768 IEXPLORE.EXE IEXPLORE.EXE PID 1768 wrote to memory of 1668 1768 IEXPLORE.EXE IEXPLORE.EXE PID 1768 wrote to memory of 1668 1768 IEXPLORE.EXE IEXPLORE.EXE PID 1768 wrote to memory of 1668 1768 IEXPLORE.EXE IEXPLORE.EXE PID 2004 wrote to memory of 976 2004 IEXPLORE.EXE IEXPLORE.EXE PID 2004 wrote to memory of 976 2004 IEXPLORE.EXE IEXPLORE.EXE PID 2004 wrote to memory of 976 2004 IEXPLORE.EXE IEXPLORE.EXE PID 2004 wrote to memory of 976 2004 IEXPLORE.EXE IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE PID 1348 wrote to memory of 1668 1348 svcr.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe"C:\Users\Admin\AppData\Local\Temp\8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe"1⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:6501379 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\svcr.exe"C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\8096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58.exe"2⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4AJGXL9D.txtFilesize
608B
MD569ed57d071a60754adea7ff0e625cb4f
SHA1681e2f6f7cb44b525a4be3b39b7ff9916d3e96c5
SHA256970d62515e26c4960f7e439f0cfdc513d7588920c3b9d6d9a6c4ff9f5cf4df04
SHA5122e66dbf8ae95b98f4804c57fc35727d30c33c60b53f8decb4daebb51f74a1588ed7212e6c25644b995de310026bdbaf6315448908d47f582eab736c1a0241d18
-
C:\Windows\svcr.exeFilesize
919KB
MD5460f7f13dcf4910c982fbd2faaf4b9f7
SHA193f37b5851afa3be62abff689c275fd905e17779
SHA2568096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58
SHA5126d5aeaaf82faa5b0b4d11bc10e0fa65294876724f8d9629a2f619368c517449bfb7e725006b725d30134e9da5fa84f27888252b72a2a7555f62138a005e8735e
-
C:\Windows\svcr.exeFilesize
919KB
MD5460f7f13dcf4910c982fbd2faaf4b9f7
SHA193f37b5851afa3be62abff689c275fd905e17779
SHA2568096e1296e9cc0b913101fd79eddda037ae513c9973f07066270abf3fb3d0b58
SHA5126d5aeaaf82faa5b0b4d11bc10e0fa65294876724f8d9629a2f619368c517449bfb7e725006b725d30134e9da5fa84f27888252b72a2a7555f62138a005e8735e
-
memory/780-54-0x0000000076321000-0x0000000076323000-memory.dmpFilesize
8KB
-
memory/780-55-0x0000000000400000-0x00000000004F4000-memory.dmpFilesize
976KB
-
memory/780-58-0x0000000000400000-0x00000000004F4000-memory.dmpFilesize
976KB
-
memory/1348-56-0x0000000000000000-mapping.dmp
-
memory/1348-61-0x0000000000400000-0x00000000004F4000-memory.dmpFilesize
976KB
-
memory/1348-63-0x0000000010410000-0x000000001042E000-memory.dmpFilesize
120KB
-
memory/1348-70-0x0000000000400000-0x00000000004F4000-memory.dmpFilesize
976KB