Analysis
-
max time kernel
152s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 21:30
Static task
static1
Behavioral task
behavioral1
Sample
b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe
Resource
win10v2004-20221111-en
General
-
Target
b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe
-
Size
122KB
-
MD5
6900a40663f94842ec2546855cd4ccc7
-
SHA1
3a2f6b5ac454dbd8ecc5abe3c5bfabebb72d756c
-
SHA256
b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b
-
SHA512
f7d6f9902b4896f76fc6550d8c49eb295f79acc3c2ab7f58fc0507037c0941513d00f7f6d02ee370c37803246ba87106e9a550de4b914e854899a895869e02f9
-
SSDEEP
1536:nFyzF9MFVCujlsQoeQZZ86ukpj0nGGF9v+4DR18hW:FyzQVCujl71QZZ4kp4F9Xt6hW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Executes dropped EXE 4 IoCs
pid Process 1052 explorer.exe 1240 spoolsv.exe 972 svchost.exe 1164 spoolsv.exe -
Modifies Installed Components in the registry 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" svchost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F146C9B1-VMVQ-A9RC-NUFL-D0BA00B4E999} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe -
Loads dropped DLL 8 IoCs
pid Process 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 1052 explorer.exe 1052 explorer.exe 1240 spoolsv.exe 1240 spoolsv.exe 972 svchost.exe 972 svchost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System\tjud.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\svchost.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 972 svchost.exe 1052 explorer.exe 972 svchost.exe 1052 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1052 explorer.exe 972 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 1052 explorer.exe 1052 explorer.exe 1240 spoolsv.exe 1240 spoolsv.exe 972 svchost.exe 972 svchost.exe 1164 spoolsv.exe 1164 spoolsv.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1052 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 27 PID 1028 wrote to memory of 1052 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 27 PID 1028 wrote to memory of 1052 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 27 PID 1028 wrote to memory of 1052 1028 b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe 27 PID 1052 wrote to memory of 1240 1052 explorer.exe 28 PID 1052 wrote to memory of 1240 1052 explorer.exe 28 PID 1052 wrote to memory of 1240 1052 explorer.exe 28 PID 1052 wrote to memory of 1240 1052 explorer.exe 28 PID 1240 wrote to memory of 972 1240 spoolsv.exe 29 PID 1240 wrote to memory of 972 1240 spoolsv.exe 29 PID 1240 wrote to memory of 972 1240 spoolsv.exe 29 PID 1240 wrote to memory of 972 1240 spoolsv.exe 29 PID 972 wrote to memory of 1164 972 svchost.exe 30 PID 972 wrote to memory of 1164 972 svchost.exe 30 PID 972 wrote to memory of 1164 972 svchost.exe 30 PID 972 wrote to memory of 1164 972 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe"C:\Users\Admin\AppData\Local\Temp\b3c4cd794c34cd836c16c00133410c846476bbbf48761a40b72ceb5ae65b460b.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe PR5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD54a86d5d2e1610ccaa86c830beaf6054c
SHA1075ce9843dd7edb70eb30f3d685f274adbdcaa1b
SHA2566f4c1141fd5c8ae861e3715cf23cd675a8f4a45079299bfd09a297758e38df32
SHA5123ca526cdca40ed0d848fc2d5f67bf01ed56607570532363a56f2f970b6106ae53319821c2d27cb1e7a9f9d02a292690d128ea0251f93422deeaa8e4a8e57f18f
-
Filesize
122KB
MD5e668825fac0bb8fc979bf1b2ffea00f5
SHA196c9a15d54faa3805a2795c50f39c25826b059e9
SHA2561521aed286ea8358cf9a647b78679b66dc82b0ce7e1e5bd68e7e102969d2f335
SHA51212001ac959b497bdc18c876375f22d882fabce19a956ea10551fa8f04874120065bf00591afb88367ef3b215637d9811f73917369639a2b9336ad6a2e02af49f
-
Filesize
122KB
MD506f8de3a795a792120781079a9f8b93c
SHA1401d92e5c56438cc885b4eb5ba5d64d76bdb8bb2
SHA2564300eaaff53b45429cdb0ec01955f322a4c2ab18cc7aa0c93c3d047a210dfc00
SHA512ec988b6bebaee83a5a45671ad19440f7681d3cf241c1834749e7d426e1a740bbdcce18d240f3a9ecd524f9d86a7ad76eefddb254a7f7a379d57532072d6834a5
-
Filesize
122KB
MD506f8de3a795a792120781079a9f8b93c
SHA1401d92e5c56438cc885b4eb5ba5d64d76bdb8bb2
SHA2564300eaaff53b45429cdb0ec01955f322a4c2ab18cc7aa0c93c3d047a210dfc00
SHA512ec988b6bebaee83a5a45671ad19440f7681d3cf241c1834749e7d426e1a740bbdcce18d240f3a9ecd524f9d86a7ad76eefddb254a7f7a379d57532072d6834a5
-
Filesize
122KB
MD54a82baf68c0a91565cd5dff6a51b9cc2
SHA1b0c41e973b16e0c3f773bf6ec17df96aa857d3d7
SHA2566737e220506b6a9ff49901f24ce381a23059317f81d4b42383d6a83fa167989c
SHA512681910576c8c5a5cc2b876210615cf657da470086c817d54c50115099293cf41c9c77fcfc8190ae1495c735095321adcfb899a47ed0a5bb6a650c2eff0363fd5
-
Filesize
122KB
MD5e668825fac0bb8fc979bf1b2ffea00f5
SHA196c9a15d54faa3805a2795c50f39c25826b059e9
SHA2561521aed286ea8358cf9a647b78679b66dc82b0ce7e1e5bd68e7e102969d2f335
SHA51212001ac959b497bdc18c876375f22d882fabce19a956ea10551fa8f04874120065bf00591afb88367ef3b215637d9811f73917369639a2b9336ad6a2e02af49f
-
Filesize
122KB
MD506f8de3a795a792120781079a9f8b93c
SHA1401d92e5c56438cc885b4eb5ba5d64d76bdb8bb2
SHA2564300eaaff53b45429cdb0ec01955f322a4c2ab18cc7aa0c93c3d047a210dfc00
SHA512ec988b6bebaee83a5a45671ad19440f7681d3cf241c1834749e7d426e1a740bbdcce18d240f3a9ecd524f9d86a7ad76eefddb254a7f7a379d57532072d6834a5
-
Filesize
122KB
MD54a82baf68c0a91565cd5dff6a51b9cc2
SHA1b0c41e973b16e0c3f773bf6ec17df96aa857d3d7
SHA2566737e220506b6a9ff49901f24ce381a23059317f81d4b42383d6a83fa167989c
SHA512681910576c8c5a5cc2b876210615cf657da470086c817d54c50115099293cf41c9c77fcfc8190ae1495c735095321adcfb899a47ed0a5bb6a650c2eff0363fd5
-
Filesize
122KB
MD5e668825fac0bb8fc979bf1b2ffea00f5
SHA196c9a15d54faa3805a2795c50f39c25826b059e9
SHA2561521aed286ea8358cf9a647b78679b66dc82b0ce7e1e5bd68e7e102969d2f335
SHA51212001ac959b497bdc18c876375f22d882fabce19a956ea10551fa8f04874120065bf00591afb88367ef3b215637d9811f73917369639a2b9336ad6a2e02af49f
-
Filesize
122KB
MD5e668825fac0bb8fc979bf1b2ffea00f5
SHA196c9a15d54faa3805a2795c50f39c25826b059e9
SHA2561521aed286ea8358cf9a647b78679b66dc82b0ce7e1e5bd68e7e102969d2f335
SHA51212001ac959b497bdc18c876375f22d882fabce19a956ea10551fa8f04874120065bf00591afb88367ef3b215637d9811f73917369639a2b9336ad6a2e02af49f
-
Filesize
122KB
MD506f8de3a795a792120781079a9f8b93c
SHA1401d92e5c56438cc885b4eb5ba5d64d76bdb8bb2
SHA2564300eaaff53b45429cdb0ec01955f322a4c2ab18cc7aa0c93c3d047a210dfc00
SHA512ec988b6bebaee83a5a45671ad19440f7681d3cf241c1834749e7d426e1a740bbdcce18d240f3a9ecd524f9d86a7ad76eefddb254a7f7a379d57532072d6834a5
-
Filesize
122KB
MD506f8de3a795a792120781079a9f8b93c
SHA1401d92e5c56438cc885b4eb5ba5d64d76bdb8bb2
SHA2564300eaaff53b45429cdb0ec01955f322a4c2ab18cc7aa0c93c3d047a210dfc00
SHA512ec988b6bebaee83a5a45671ad19440f7681d3cf241c1834749e7d426e1a740bbdcce18d240f3a9ecd524f9d86a7ad76eefddb254a7f7a379d57532072d6834a5
-
Filesize
122KB
MD506f8de3a795a792120781079a9f8b93c
SHA1401d92e5c56438cc885b4eb5ba5d64d76bdb8bb2
SHA2564300eaaff53b45429cdb0ec01955f322a4c2ab18cc7aa0c93c3d047a210dfc00
SHA512ec988b6bebaee83a5a45671ad19440f7681d3cf241c1834749e7d426e1a740bbdcce18d240f3a9ecd524f9d86a7ad76eefddb254a7f7a379d57532072d6834a5
-
Filesize
122KB
MD506f8de3a795a792120781079a9f8b93c
SHA1401d92e5c56438cc885b4eb5ba5d64d76bdb8bb2
SHA2564300eaaff53b45429cdb0ec01955f322a4c2ab18cc7aa0c93c3d047a210dfc00
SHA512ec988b6bebaee83a5a45671ad19440f7681d3cf241c1834749e7d426e1a740bbdcce18d240f3a9ecd524f9d86a7ad76eefddb254a7f7a379d57532072d6834a5
-
Filesize
122KB
MD54a82baf68c0a91565cd5dff6a51b9cc2
SHA1b0c41e973b16e0c3f773bf6ec17df96aa857d3d7
SHA2566737e220506b6a9ff49901f24ce381a23059317f81d4b42383d6a83fa167989c
SHA512681910576c8c5a5cc2b876210615cf657da470086c817d54c50115099293cf41c9c77fcfc8190ae1495c735095321adcfb899a47ed0a5bb6a650c2eff0363fd5
-
Filesize
122KB
MD54a82baf68c0a91565cd5dff6a51b9cc2
SHA1b0c41e973b16e0c3f773bf6ec17df96aa857d3d7
SHA2566737e220506b6a9ff49901f24ce381a23059317f81d4b42383d6a83fa167989c
SHA512681910576c8c5a5cc2b876210615cf657da470086c817d54c50115099293cf41c9c77fcfc8190ae1495c735095321adcfb899a47ed0a5bb6a650c2eff0363fd5