Analysis
-
max time kernel
178s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe
Resource
win10v2004-20220812-en
General
-
Target
98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe
-
Size
105KB
-
MD5
85e895f88c2221af4d2f086e1598cc97
-
SHA1
e97ec11b25c30dc94cce5e440252c7a6fbd016a3
-
SHA256
98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1
-
SHA512
a272ff05d6c09ecb7e231bb7edd47d3c1e3dbf5485f8d360ba980c029c5b3900e65fd6082d27eaca5141270fba548a2cc254ff97a7463fe8f7a9fe6ac65044ae
-
SSDEEP
1536:F2gDm9Cg65AziTSZbKUFEb3G1N+aHBDdp3qx8amI:EsNQiTctEb3kHB76iM
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\16750187-0001-1100245\svcsrv.exe = "C:\\Users\\Admin\\16750187-0001-1100245\\svcsrv.exe:*:Enabled:Microsoft® Windows System" 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe -
Executes dropped EXE 2 IoCs
pid Process 564 svcsrv.exe 1976 svcsrv.exe -
Loads dropped DLL 2 IoCs
pid Process 1972 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 1972 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows System = "C:\\Users\\Admin\\16750187-0001-1100245\\svcsrv.exe" 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2040 set thread context of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 564 set thread context of 1976 564 svcsrv.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 2040 wrote to memory of 1972 2040 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 27 PID 1972 wrote to memory of 564 1972 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 28 PID 1972 wrote to memory of 564 1972 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 28 PID 1972 wrote to memory of 564 1972 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 28 PID 1972 wrote to memory of 564 1972 98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe 28 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29 PID 564 wrote to memory of 1976 564 svcsrv.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe"C:\Users\Admin\AppData\Local\Temp\98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe"C:\Users\Admin\AppData\Local\Temp\98b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\16750187-0001-1100245\svcsrv.exe"C:\Users\Admin\16750187-0001-1100245\svcsrv.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\16750187-0001-1100245\svcsrv.exe"C:\Users\Admin\16750187-0001-1100245\svcsrv.exe"4⤵
- Executes dropped EXE
PID:1976
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD585e895f88c2221af4d2f086e1598cc97
SHA1e97ec11b25c30dc94cce5e440252c7a6fbd016a3
SHA25698b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1
SHA512a272ff05d6c09ecb7e231bb7edd47d3c1e3dbf5485f8d360ba980c029c5b3900e65fd6082d27eaca5141270fba548a2cc254ff97a7463fe8f7a9fe6ac65044ae
-
Filesize
105KB
MD585e895f88c2221af4d2f086e1598cc97
SHA1e97ec11b25c30dc94cce5e440252c7a6fbd016a3
SHA25698b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1
SHA512a272ff05d6c09ecb7e231bb7edd47d3c1e3dbf5485f8d360ba980c029c5b3900e65fd6082d27eaca5141270fba548a2cc254ff97a7463fe8f7a9fe6ac65044ae
-
Filesize
105KB
MD585e895f88c2221af4d2f086e1598cc97
SHA1e97ec11b25c30dc94cce5e440252c7a6fbd016a3
SHA25698b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1
SHA512a272ff05d6c09ecb7e231bb7edd47d3c1e3dbf5485f8d360ba980c029c5b3900e65fd6082d27eaca5141270fba548a2cc254ff97a7463fe8f7a9fe6ac65044ae
-
Filesize
105KB
MD585e895f88c2221af4d2f086e1598cc97
SHA1e97ec11b25c30dc94cce5e440252c7a6fbd016a3
SHA25698b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1
SHA512a272ff05d6c09ecb7e231bb7edd47d3c1e3dbf5485f8d360ba980c029c5b3900e65fd6082d27eaca5141270fba548a2cc254ff97a7463fe8f7a9fe6ac65044ae
-
Filesize
105KB
MD585e895f88c2221af4d2f086e1598cc97
SHA1e97ec11b25c30dc94cce5e440252c7a6fbd016a3
SHA25698b069ee1ac97c95d69a120ca1801da9568283f643095db5679f3d6a134f31a1
SHA512a272ff05d6c09ecb7e231bb7edd47d3c1e3dbf5485f8d360ba980c029c5b3900e65fd6082d27eaca5141270fba548a2cc254ff97a7463fe8f7a9fe6ac65044ae