Analysis
-
max time kernel
137s -
max time network
179s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 04:14
Static task
static1
Behavioral task
behavioral1
Sample
d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe
Resource
win7-20221111-en
General
-
Target
d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe
-
Size
169KB
-
MD5
d32ba71dfd5df6fc649515bbb0ba16bc
-
SHA1
dd0738787a869066c025b836ae631e5f883a5170
-
SHA256
d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a
-
SHA512
49ee9e6416745bd0c8c1a25ee438d38d3f87ab82671775de213ba093f08bce31f8c3cd9ca847f10b6cef58b90963fd2f8097a3aaf0ce39f68bbddebb490a5278
-
SSDEEP
3072:TNnz4Uk1hIMY8JCLiwMiCjcLUZtHdnXzN2yWTtpFfhYL:TNXkJY8JGC4UzQZtpFhYL
Malware Config
Extracted
tofsee
64.20.54.234
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
smytev.exesmytev.exepid process 784 smytev.exe 864 smytev.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1832 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exepid process 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\smytev.exe\" /r" d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exesmytev.exesmytev.exedescription pid process target process PID 1420 set thread context of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 784 set thread context of 864 784 smytev.exe smytev.exe PID 864 set thread context of 1780 864 smytev.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of UnmapMainImage 1 IoCs
Processes:
smytev.exepid process 784 smytev.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exed228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exesmytev.exesmytev.exedescription pid process target process PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 1420 wrote to memory of 2024 1420 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe PID 2024 wrote to memory of 784 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe smytev.exe PID 2024 wrote to memory of 784 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe smytev.exe PID 2024 wrote to memory of 784 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe smytev.exe PID 2024 wrote to memory of 784 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 784 wrote to memory of 864 784 smytev.exe smytev.exe PID 864 wrote to memory of 1780 864 smytev.exe svchost.exe PID 864 wrote to memory of 1780 864 smytev.exe svchost.exe PID 864 wrote to memory of 1780 864 smytev.exe svchost.exe PID 864 wrote to memory of 1780 864 smytev.exe svchost.exe PID 864 wrote to memory of 1780 864 smytev.exe svchost.exe PID 864 wrote to memory of 1780 864 smytev.exe svchost.exe PID 2024 wrote to memory of 1832 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe cmd.exe PID 2024 wrote to memory of 1832 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe cmd.exe PID 2024 wrote to memory of 1832 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe cmd.exe PID 2024 wrote to memory of 1832 2024 d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe"C:\Users\Admin\AppData\Local\Temp\d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe"C:\Users\Admin\AppData\Local\Temp\d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\smytev.exe"C:\Users\Admin\smytev.exe" /r3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\smytev.exe"C:\Users\Admin\smytev.exe" /r4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6662.bat" "3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6662.batFilesize
135B
MD5d17043871d48a2bcfff8880e06d3974f
SHA16281bcfe66f427b68e09fb0c06300157615b16db
SHA256d5fe017c38240e68b2d5c3a46a76889c3e89be98334d9a0984466e08284f8bf6
SHA5127c0e5720644a37e70221c4e6bb9b5b337a539b228992e38c8869684cac77d335df1b580c50fe44dc6ce3332bd9851bf11810a0d58c8ef5c61c82538c016bbd4e
-
C:\Users\Admin\smytev.exeFilesize
169KB
MD5d32ba71dfd5df6fc649515bbb0ba16bc
SHA1dd0738787a869066c025b836ae631e5f883a5170
SHA256d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a
SHA51249ee9e6416745bd0c8c1a25ee438d38d3f87ab82671775de213ba093f08bce31f8c3cd9ca847f10b6cef58b90963fd2f8097a3aaf0ce39f68bbddebb490a5278
-
C:\Users\Admin\smytev.exeFilesize
169KB
MD5d32ba71dfd5df6fc649515bbb0ba16bc
SHA1dd0738787a869066c025b836ae631e5f883a5170
SHA256d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a
SHA51249ee9e6416745bd0c8c1a25ee438d38d3f87ab82671775de213ba093f08bce31f8c3cd9ca847f10b6cef58b90963fd2f8097a3aaf0ce39f68bbddebb490a5278
-
C:\Users\Admin\smytev.exeFilesize
169KB
MD5d32ba71dfd5df6fc649515bbb0ba16bc
SHA1dd0738787a869066c025b836ae631e5f883a5170
SHA256d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a
SHA51249ee9e6416745bd0c8c1a25ee438d38d3f87ab82671775de213ba093f08bce31f8c3cd9ca847f10b6cef58b90963fd2f8097a3aaf0ce39f68bbddebb490a5278
-
\Users\Admin\smytev.exeFilesize
169KB
MD5d32ba71dfd5df6fc649515bbb0ba16bc
SHA1dd0738787a869066c025b836ae631e5f883a5170
SHA256d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a
SHA51249ee9e6416745bd0c8c1a25ee438d38d3f87ab82671775de213ba093f08bce31f8c3cd9ca847f10b6cef58b90963fd2f8097a3aaf0ce39f68bbddebb490a5278
-
\Users\Admin\smytev.exeFilesize
169KB
MD5d32ba71dfd5df6fc649515bbb0ba16bc
SHA1dd0738787a869066c025b836ae631e5f883a5170
SHA256d228aa5ef0b9200d668914034d9b3cee75ec0c1c8d70eca0fb00d31ebf7a211a
SHA51249ee9e6416745bd0c8c1a25ee438d38d3f87ab82671775de213ba093f08bce31f8c3cd9ca847f10b6cef58b90963fd2f8097a3aaf0ce39f68bbddebb490a5278
-
memory/784-78-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/784-69-0x0000000000000000-mapping.dmp
-
memory/864-83-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/864-72-0x0000000000000000-mapping.dmp
-
memory/864-77-0x0000000000401000-0x000000000040BC00-memory.dmpFilesize
43KB
-
memory/864-79-0x000000000040C000-0x000000000040D600-memory.dmpFilesize
5KB
-
memory/864-85-0x000000000040C000-0x000000000040D600-memory.dmpFilesize
5KB
-
memory/1420-64-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/1780-89-0x0000000000086D22-mapping.dmp
-
memory/1780-96-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/1780-94-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/1780-88-0x0000000000080000-0x0000000000090000-memory.dmpFilesize
64KB
-
memory/1832-93-0x0000000000000000-mapping.dmp
-
memory/2024-61-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2024-80-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2024-81-0x0000000000220000-0x0000000000257000-memory.dmpFilesize
220KB
-
memory/2024-82-0x0000000000220000-0x0000000000257000-memory.dmpFilesize
220KB
-
memory/2024-55-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2024-58-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2024-60-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2024-66-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2024-62-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2024-54-0x0000000000000000-mapping.dmp
-
memory/2024-56-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/2024-65-0x00000000767B1000-0x00000000767B3000-memory.dmpFilesize
8KB