Analysis
-
max time kernel
152s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe
Resource
win10v2004-20220812-en
General
-
Target
dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe
-
Size
122KB
-
MD5
129d8a368f0c4ef256879fe99e84a6d4
-
SHA1
4bd2f36f72d2121512592bfad48df4ed3dd80e3e
-
SHA256
dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7
-
SHA512
cc37d82bae81820e12be79e8cfd0d06ede1cc8b8d917fcb66fb73e1ef89a52b4a484dfaa78abefd918c51d3aaa559b8a4a8a3596366877a7c027496a770e1850
-
SSDEEP
1536:nyyzF9MFVCujlsQoeQZZ86ukpj0nGGF9v+4DRwS8GX:yyzQVCujl71QZZ4kp4F9Xt+GX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 4880 explorer.exe 2756 spoolsv.exe 736 svchost.exe 800 spoolsv.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\system\explorer.exe dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe File opened for modification C:\Windows\System\tjud.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1812 dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe 1812 dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 736 svchost.exe 736 svchost.exe 736 svchost.exe 736 svchost.exe 4880 explorer.exe 4880 explorer.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 4880 explorer.exe 736 svchost.exe 736 svchost.exe 736 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4880 explorer.exe 736 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1812 dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe 1812 dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe 4880 explorer.exe 4880 explorer.exe 2756 spoolsv.exe 2756 spoolsv.exe 736 svchost.exe 736 svchost.exe 800 spoolsv.exe 800 spoolsv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1812 wrote to memory of 4880 1812 dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe 79 PID 1812 wrote to memory of 4880 1812 dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe 79 PID 1812 wrote to memory of 4880 1812 dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe 79 PID 4880 wrote to memory of 2756 4880 explorer.exe 80 PID 4880 wrote to memory of 2756 4880 explorer.exe 80 PID 4880 wrote to memory of 2756 4880 explorer.exe 80 PID 2756 wrote to memory of 736 2756 spoolsv.exe 81 PID 2756 wrote to memory of 736 2756 spoolsv.exe 81 PID 2756 wrote to memory of 736 2756 spoolsv.exe 81 PID 736 wrote to memory of 800 736 svchost.exe 82 PID 736 wrote to memory of 800 736 svchost.exe 82 PID 736 wrote to memory of 800 736 svchost.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe"C:\Users\Admin\AppData\Local\Temp\dd3592f1872886994f1f5faa35e570889ff8d0cc75dcb81db1626e2cad523de7.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:736 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:800
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5e00eb7adfbe789df554d2d373240fdb9
SHA1d07ae2f1a2e35d04cfc444b8a86d820d37aa76d1
SHA256ecdd44649ee357563aacb409455e2739da730733fcd00b6750904728b1ec423e
SHA5128d0d261f0199c16309f76174228a3d9e4f735e6455823c452fc1d2847befe1d24928641062e7a69f13423a4ad49e482fec22db549bc3b67d7c07aeda615cef83
-
Filesize
122KB
MD5f3b91ce426f4004fb3046d5aa2bb0c9f
SHA14ae92a41b096f3a68f9ada5977d19a77a1add9a3
SHA256eabd435691cd1341f9257f32ef04b22005be0688f37c8cf775ccd48407ad3682
SHA51274e3f05d2f04390fedada56baaaae7d912dac6d998a8b7b601465f5887f7ff77003db1b10dc48c7dc6431185aba1ebf12df01e336c4e88ccec1a31458e8059c0
-
Filesize
122KB
MD59809732bbb17671377c324dbcf6d5aee
SHA14e505c7d8553aadf00a6a5b0e6c5fa51368a950d
SHA256bf63b609dccc56b09c52062289cae79440f40ee262e9fda97d7ea3c4cedc025a
SHA51215231d44be49794d8457e58e5c52ac0ab7005db68af6893e0591839ae5079b00b50e4e1cc2f769f1e2826a2b346c2a5ceacb5f322d9251034b99bf364cce2802
-
Filesize
122KB
MD59809732bbb17671377c324dbcf6d5aee
SHA14e505c7d8553aadf00a6a5b0e6c5fa51368a950d
SHA256bf63b609dccc56b09c52062289cae79440f40ee262e9fda97d7ea3c4cedc025a
SHA51215231d44be49794d8457e58e5c52ac0ab7005db68af6893e0591839ae5079b00b50e4e1cc2f769f1e2826a2b346c2a5ceacb5f322d9251034b99bf364cce2802
-
Filesize
122KB
MD586b9a8013fd925237625ac8bde581feb
SHA14a845e8831992bd0946d5a414ee1c1bbf1b5ff75
SHA2560220ae409abfc91a0ad1b970030e58a5d585cac351d13038875dfc492c747353
SHA5125187e3541eb28bfb38ca6680acc6948c21ca6e40b91491df6658bf3de5ae4366b55aee6a3d289f7ea5d25812b310409db28b09685d33bdfd4bec6afd864e8055
-
Filesize
122KB
MD5f3b91ce426f4004fb3046d5aa2bb0c9f
SHA14ae92a41b096f3a68f9ada5977d19a77a1add9a3
SHA256eabd435691cd1341f9257f32ef04b22005be0688f37c8cf775ccd48407ad3682
SHA51274e3f05d2f04390fedada56baaaae7d912dac6d998a8b7b601465f5887f7ff77003db1b10dc48c7dc6431185aba1ebf12df01e336c4e88ccec1a31458e8059c0
-
Filesize
122KB
MD59809732bbb17671377c324dbcf6d5aee
SHA14e505c7d8553aadf00a6a5b0e6c5fa51368a950d
SHA256bf63b609dccc56b09c52062289cae79440f40ee262e9fda97d7ea3c4cedc025a
SHA51215231d44be49794d8457e58e5c52ac0ab7005db68af6893e0591839ae5079b00b50e4e1cc2f769f1e2826a2b346c2a5ceacb5f322d9251034b99bf364cce2802
-
Filesize
122KB
MD586b9a8013fd925237625ac8bde581feb
SHA14a845e8831992bd0946d5a414ee1c1bbf1b5ff75
SHA2560220ae409abfc91a0ad1b970030e58a5d585cac351d13038875dfc492c747353
SHA5125187e3541eb28bfb38ca6680acc6948c21ca6e40b91491df6658bf3de5ae4366b55aee6a3d289f7ea5d25812b310409db28b09685d33bdfd4bec6afd864e8055