Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe
Resource
win10v2004-20220812-en
General
-
Target
c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe
-
Size
743KB
-
MD5
b6e08a65972c4023436c14a359fe73af
-
SHA1
611847af498d29c8e2404fc7124c994c5f4085b1
-
SHA256
c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01
-
SHA512
569d9d02fb73d3637e35f52939436a14d09818431f7663526d6c5f08792a8390da631d64f59ddac08b53f984fc326da3431b73470a5642e5a0cbf7a686527df3
-
SSDEEP
12288:LczJJhqrVPllvKspPT3GWGqWKNiTic4RVavipq2i3e3eRYSLuzq:LczJKVdD3GzqWTec4RcEq2i3euR/uzq
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Server.exeServer.exeKmsServer.exepid process 1028 Server.exe 1760 Server.exe 1792 KmsServer.exe -
Possible privilege escalation attempt 8 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exepid process 812 takeown.exe 936 icacls.exe 892 takeown.exe 1144 icacls.exe 1764 takeown.exe 576 icacls.exe 928 takeown.exe 564 icacls.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe upx \Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe upx C:\Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe upx behavioral1/memory/1760-101-0x0000000000400000-0x0000000000413000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1216 cmd.exe -
Loads dropped DLL 5 IoCs
Processes:
cmd.exeServer.execmd.exepid process 1216 cmd.exe 1028 Server.exe 1028 Server.exe 600 cmd.exe 600 cmd.exe -
Modifies file permissions 1 TTPs 8 IoCs
Processes:
icacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exeicacls.exetakeown.exepid process 576 icacls.exe 928 takeown.exe 564 icacls.exe 812 takeown.exe 936 icacls.exe 892 takeown.exe 1144 icacls.exe 1764 takeown.exe -
Drops file in System32 directory 4 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\SysWOW64\OGACheckControl.dll cmd.exe File opened for modification C:\Windows\SysWOW64\OGACheckControl.dll cmd.exe File created C:\Windows\system32\OGACheckControl.dll cmd.exe File opened for modification C:\Windows\system32\OGACheckControl.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1532 timeout.exe 1756 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1516 taskkill.exe -
Runs .reg file with regedit 2 IoCs
Processes:
regedit.exeregedit.exepid process 936 regedit.exe 344 regedit.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
takeown.exetakeown.exetakeown.exetakeown.exetaskkill.exedescription pid process Token: SeTakeOwnershipPrivilege 1764 takeown.exe Token: SeTakeOwnershipPrivilege 928 takeown.exe Token: SeTakeOwnershipPrivilege 812 takeown.exe Token: SeTakeOwnershipPrivilege 892 takeown.exe Token: SeDebugPrivilege 1516 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exeWScript.execmd.exeregedt32.exeregedt32.exedescription pid process target process PID 1336 wrote to memory of 996 1336 c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe WScript.exe PID 1336 wrote to memory of 996 1336 c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe WScript.exe PID 1336 wrote to memory of 996 1336 c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe WScript.exe PID 1336 wrote to memory of 996 1336 c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe WScript.exe PID 1336 wrote to memory of 996 1336 c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe WScript.exe PID 1336 wrote to memory of 996 1336 c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe WScript.exe PID 1336 wrote to memory of 996 1336 c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe WScript.exe PID 996 wrote to memory of 1216 996 WScript.exe cmd.exe PID 996 wrote to memory of 1216 996 WScript.exe cmd.exe PID 996 wrote to memory of 1216 996 WScript.exe cmd.exe PID 996 wrote to memory of 1216 996 WScript.exe cmd.exe PID 996 wrote to memory of 1216 996 WScript.exe cmd.exe PID 996 wrote to memory of 1216 996 WScript.exe cmd.exe PID 996 wrote to memory of 1216 996 WScript.exe cmd.exe PID 1216 wrote to memory of 1872 1216 cmd.exe reg.exe PID 1216 wrote to memory of 1872 1216 cmd.exe reg.exe PID 1216 wrote to memory of 1872 1216 cmd.exe reg.exe PID 1216 wrote to memory of 1872 1216 cmd.exe reg.exe PID 1216 wrote to memory of 1872 1216 cmd.exe reg.exe PID 1216 wrote to memory of 1872 1216 cmd.exe reg.exe PID 1216 wrote to memory of 1872 1216 cmd.exe reg.exe PID 1216 wrote to memory of 268 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 268 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 268 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 268 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 268 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 268 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 268 1216 cmd.exe regedt32.exe PID 268 wrote to memory of 936 268 regedt32.exe regedit.exe PID 268 wrote to memory of 936 268 regedt32.exe regedit.exe PID 268 wrote to memory of 936 268 regedt32.exe regedit.exe PID 268 wrote to memory of 936 268 regedt32.exe regedit.exe PID 268 wrote to memory of 936 268 regedt32.exe regedit.exe PID 268 wrote to memory of 936 268 regedt32.exe regedit.exe PID 268 wrote to memory of 936 268 regedt32.exe regedit.exe PID 1216 wrote to memory of 2032 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 2032 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 2032 1216 cmd.exe regedt32.exe PID 1216 wrote to memory of 2032 1216 cmd.exe regedt32.exe PID 2032 wrote to memory of 344 2032 regedt32.exe regedit.exe PID 2032 wrote to memory of 344 2032 regedt32.exe regedit.exe PID 2032 wrote to memory of 344 2032 regedt32.exe regedit.exe PID 1216 wrote to memory of 1764 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 1764 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 1764 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 1764 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 1764 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 1764 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 1764 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 576 1216 cmd.exe icacls.exe PID 1216 wrote to memory of 576 1216 cmd.exe icacls.exe PID 1216 wrote to memory of 576 1216 cmd.exe icacls.exe PID 1216 wrote to memory of 576 1216 cmd.exe icacls.exe PID 1216 wrote to memory of 576 1216 cmd.exe icacls.exe PID 1216 wrote to memory of 576 1216 cmd.exe icacls.exe PID 1216 wrote to memory of 576 1216 cmd.exe icacls.exe PID 1216 wrote to memory of 928 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 928 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 928 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 928 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 928 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 928 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 928 1216 cmd.exe takeown.exe PID 1216 wrote to memory of 564 1216 cmd.exe icacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe"C:\Users\Admin\AppData\Local\Temp\c21838a03307cd311d7476709346d8a132861859d5eab6a638910fb73f87fc01.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\A.I.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Run.cmd" "3⤵
- Deletes itself
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\SOFTWARE\Microsoft\Office\14.0" /s4⤵PID:1872
-
C:\Windows\SysWOW64\regedt32.exeC:\Windows\System32\regedt32.exe /s Server.reg4⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s Server.reg5⤵
- Runs .reg file with regedit
PID:936 -
C:\Windows\system32\regedt32.exeC:\Windows\Sysnative\regedt32.exe /s Server.reg4⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\regedit.exe"C:\Windows\regedit.exe" /s Server.reg5⤵
- Runs .reg file with regedit
PID:344 -
C:\Windows\SysWOW64\takeown.exetakeown /F C:\Windows\System32\rundll32.exe4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\rundll32.exe /deny everyone:F4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:576 -
C:\Windows\SysWOW64\takeown.exetakeown /F C:\Windows\Sysnative\rundll32.exe4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:928 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\Sysnative\rundll32.exe /deny everyone:F4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:564 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Server.exeServer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Server.exe"5⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX1\install.cmd" "6⤵
- Loads dropped DLL
PID:600 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\KmsServer.exeKmsServer.exe7⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1532 -
C:\Windows\SysWOW64\cscript.execscript ospp.vbs /act4⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K oc.cmd4⤵PID:940
-
C:\Windows\SysWOW64\cscript.execscript //nologo ospp.vbs /dstatus5⤵PID:1848
-
C:\Windows\SysWOW64\takeown.exetakeown /F C:\Windows\System32\rundll32.exe4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:812 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\System32\rundll32.exe /grant everyone:F4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:936 -
C:\Windows\SysWOW64\takeown.exetakeown /F C:\Windows\Sysnative\rundll32.exe4⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:892 -
C:\Windows\SysWOW64\icacls.exeicacls C:\Windows\Sysnative\rundll32.exe /grant everyone:F4⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1144 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im KmsServer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\SysWOW64\timeout.exetimeout /t 2 /nobreak4⤵
- Delays execution with timeout.exe
PID:1756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD5caa3eb92c5d0044698cb72ea699f5022
SHA119b81006722a84395a9ee1486494a050ddf4dd0f
SHA2565d9fd4c0364235e54a490a79f482dcc6e61d6ea7092e7dcfd53434df8b11e9d2
SHA51293960758183eeecbe5fb1cb3b9448b51169444d6e42e1e66427362e430b1622d366f5b9e670487bd4ebefe9d540e74882b4c8847e7cff23374fbc57e1adbdddd
-
Filesize
2KB
MD5ebfcb3f32c9120834f5b343c943028ee
SHA1b010ae7589b2f61c3f186ecb17fece2823a1df7c
SHA2569a318489ebad778d06dcfc2fdf9e17a95f005d30c25e07f05f6694cd08bec341
SHA5128a575790b5aaf668ba3b2a5028331a70948f063b3f08c3cede6da590a017b24371613192cabd08ef12a884c03222f1f8e338994080b2fba920a13edfe9774bbf
-
Filesize
412KB
MD5bf577094d53599f1ae46fdc409ccc9ff
SHA153a45bf84e66ddb51fe99b6dd8acd25ee1e4c718
SHA256e4fbb213a63e375c318712ec3a91f6341e6a08941a69c57e68cacaf5cd41337d
SHA5123234080f01092cd605549f724f3cc6fb17b571b90f21f11ca314c68e00ce7d64c54384ef47472abca0d6d18f43c3f041a5b141d31bcde027bea2abbdd65bae52
-
Filesize
412KB
MD5bf577094d53599f1ae46fdc409ccc9ff
SHA153a45bf84e66ddb51fe99b6dd8acd25ee1e4c718
SHA256e4fbb213a63e375c318712ec3a91f6341e6a08941a69c57e68cacaf5cd41337d
SHA5123234080f01092cd605549f724f3cc6fb17b571b90f21f11ca314c68e00ce7d64c54384ef47472abca0d6d18f43c3f041a5b141d31bcde027bea2abbdd65bae52
-
Filesize
314B
MD591dc95a38d11701bcce847af2833e325
SHA16c78dc43ada507c8649177dbbee65c76f408d1a0
SHA256abbabbd757aab5953be79b4ad2279eabfb7ee09dd7bc88a39cca01452d982ec2
SHA512cbeba9ceda31cad1cc85d038b854b1c5c0f61e20d1d5f94f3c79ea67d279a30942fbdd32eb5a11f56336301e691b0a64389eacbaf74b4e5204f4c1b12617a116
-
Filesize
101B
MD5885d3dbca690177ab9c86c04736e02a6
SHA170906e97cd79011a449fede2448eaa91dee020de
SHA256a950c4894ab269be4913149c3228f773fbce10a175e2a76b13482f263b8d89a4
SHA5128209018e0925736984b1a228407ea2cde2c1dc9e54de23cc1998f16c55df3e91a0780641563ea3484a785cbd9d1b0b64696bbac25e6a0a50e74a23a0bf95d5d5
-
Filesize
651KB
MD5964a4192ffb663b98ec612c69fb7b4bd
SHA1bb9aec8dda35818a7d7b24ac9751c8c881a64cde
SHA25669ceb118bcbadb2b828855db26d53bc4cbb3b6c26b482ac9d0d947a3d3045eaf
SHA5121486237ba86fc01390b4c5cd58bf62795f0ef96f9cce524d1d62b76120700fa96cdd374897753fd847ec7b20019c28486119d667d6b71dd2f7a9e1405f60da68
-
Filesize
48KB
MD5572e9a87757ac96c7677fd1b1b113c55
SHA19c8b96971997cd2dc0ed14f19dd9bc56d3348c3a
SHA256008cf05944053116a095ad466561d3fd4be8a7de79e5ada7c5daab492f730465
SHA512bf670754942cfa839de4a31676a3ba2ac8cd1a00de6f1b70aff995e14a9c489e996e9a019898ec3470a11d02c14ab7a8fe4855a8f028d6b4ea987e51411d7be3
-
Filesize
32KB
MD5df1ef05879e06c5f09f3e1022f37b5cb
SHA123aaac40baec28397bb59cfa584e165062d18506
SHA256d49adf2dabbbf6aa43ce4e336af4f768207df75302ebf568a94a5350aac988c5
SHA51278f0d21538483d3bac9d8b409554ac89a98a4943666f0ff88207831ab3e1d264c2efa0ea0e4703375aa15516809353f9b7477561a0a4ffe0b930b3e39f8b7e07
-
Filesize
148KB
MD5df4e58adfebda4f96de5d9a8b1a512a5
SHA15e6822206d28cee5c23e1f2d8b04d56889b0d10e
SHA25609296493a8eb232cc7649f6c0449050dc843f4f3fb787e07c81bb4143e7f456f
SHA51290fd40b273fe942610cca22bb402983e6e69752c4ef26c3aa6ae8f9d3e29733e49b26f014d6428eedc1e80222be2f3f11283342bb665bcec8881336a829c7baa
-
Filesize
148KB
MD5df4e58adfebda4f96de5d9a8b1a512a5
SHA15e6822206d28cee5c23e1f2d8b04d56889b0d10e
SHA25609296493a8eb232cc7649f6c0449050dc843f4f3fb787e07c81bb4143e7f456f
SHA51290fd40b273fe942610cca22bb402983e6e69752c4ef26c3aa6ae8f9d3e29733e49b26f014d6428eedc1e80222be2f3f11283342bb665bcec8881336a829c7baa
-
Filesize
21KB
MD5f3244e8ae8b1ca3448468ef565226303
SHA18bd31269081a9a4c55e47c91c9d8d25742c90eb1
SHA256dc7c712bdaac9b3f9d480c15d6cf801f8084be8d1535d0f926e72bfc4bf6367f
SHA512d91a2d455a11ed9bae448ccb17af98f50c7d3183e88501462ab80cc23060e3052699983d5e050f70eeaab4297215f585d860b463bdd46bb8314d45580a26336d
-
Filesize
21KB
MD5f3244e8ae8b1ca3448468ef565226303
SHA18bd31269081a9a4c55e47c91c9d8d25742c90eb1
SHA256dc7c712bdaac9b3f9d480c15d6cf801f8084be8d1535d0f926e72bfc4bf6367f
SHA512d91a2d455a11ed9bae448ccb17af98f50c7d3183e88501462ab80cc23060e3052699983d5e050f70eeaab4297215f585d860b463bdd46bb8314d45580a26336d
-
Filesize
61B
MD578b1c04bf28a366b1095d83bb8670af5
SHA15a7df12292f8b83ad63b915bc473ea8a3339c41e
SHA2560f1d6d21bfb795ec47bea8290290484684d00cdaa75c0ee10c1912d555fe8171
SHA512f488d74856b11e38de441674495ca0f438e8031d7eae387b350d61eada0fec24400c0e15eee8117a5adccbdd3de19ca2bc443ee5063ae208e6a75369f4eccdb3
-
Filesize
412KB
MD5bf577094d53599f1ae46fdc409ccc9ff
SHA153a45bf84e66ddb51fe99b6dd8acd25ee1e4c718
SHA256e4fbb213a63e375c318712ec3a91f6341e6a08941a69c57e68cacaf5cd41337d
SHA5123234080f01092cd605549f724f3cc6fb17b571b90f21f11ca314c68e00ce7d64c54384ef47472abca0d6d18f43c3f041a5b141d31bcde027bea2abbdd65bae52
-
Filesize
148KB
MD5df4e58adfebda4f96de5d9a8b1a512a5
SHA15e6822206d28cee5c23e1f2d8b04d56889b0d10e
SHA25609296493a8eb232cc7649f6c0449050dc843f4f3fb787e07c81bb4143e7f456f
SHA51290fd40b273fe942610cca22bb402983e6e69752c4ef26c3aa6ae8f9d3e29733e49b26f014d6428eedc1e80222be2f3f11283342bb665bcec8881336a829c7baa
-
Filesize
148KB
MD5df4e58adfebda4f96de5d9a8b1a512a5
SHA15e6822206d28cee5c23e1f2d8b04d56889b0d10e
SHA25609296493a8eb232cc7649f6c0449050dc843f4f3fb787e07c81bb4143e7f456f
SHA51290fd40b273fe942610cca22bb402983e6e69752c4ef26c3aa6ae8f9d3e29733e49b26f014d6428eedc1e80222be2f3f11283342bb665bcec8881336a829c7baa
-
Filesize
21KB
MD5f3244e8ae8b1ca3448468ef565226303
SHA18bd31269081a9a4c55e47c91c9d8d25742c90eb1
SHA256dc7c712bdaac9b3f9d480c15d6cf801f8084be8d1535d0f926e72bfc4bf6367f
SHA512d91a2d455a11ed9bae448ccb17af98f50c7d3183e88501462ab80cc23060e3052699983d5e050f70eeaab4297215f585d860b463bdd46bb8314d45580a26336d
-
Filesize
21KB
MD5f3244e8ae8b1ca3448468ef565226303
SHA18bd31269081a9a4c55e47c91c9d8d25742c90eb1
SHA256dc7c712bdaac9b3f9d480c15d6cf801f8084be8d1535d0f926e72bfc4bf6367f
SHA512d91a2d455a11ed9bae448ccb17af98f50c7d3183e88501462ab80cc23060e3052699983d5e050f70eeaab4297215f585d860b463bdd46bb8314d45580a26336d