Analysis
-
max time kernel
142s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 08:04
Behavioral task
behavioral1
Sample
7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe
Resource
win10v2004-20221111-en
General
-
Target
7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe
-
Size
2.4MB
-
MD5
c6ccdfd1d5f9d5be810d465bef9a1f49
-
SHA1
3145b0dcaf3d59b8f3fd9d4abd70d5e2ea8c08ec
-
SHA256
7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3
-
SHA512
614b4f559e2f01d70f8f610da394e8a0c07a2e4bfb800b96f03d3d08fa7166bd471737c45cedac4035d7aac10e2a8f7a90297fababcbcf8558902b6503b61734
-
SSDEEP
49152:/EVUchExecJDGxP1NC+A/PLKhAFs1NPIJBIpqJmBOVN6ZSQQ5nqY7yCt:/E38JDAL8M2sDCWpEm8VJQIt
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1528 j.exe 2012 Project1.exe 2044 sevc host.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1712 netsh.exe -
resource yara_rule behavioral1/files/0x0009000000012353-58.dat upx behavioral1/files/0x0009000000012353-60.dat upx behavioral1/files/0x0009000000012353-62.dat upx behavioral1/memory/1512-64-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/1512-66-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral1/memory/2012-67-0x0000000000400000-0x000000000070D000-memory.dmp upx behavioral1/files/0x0009000000012353-69.dat upx behavioral1/memory/2012-72-0x0000000000400000-0x000000000070D000-memory.dmp upx -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7bfa60839bfb650b87f4db3a0b635ac8.exe sevc host.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7bfa60839bfb650b87f4db3a0b635ac8.exe sevc host.exe -
Loads dropped DLL 4 IoCs
pid Process 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 1528 j.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\7bfa60839bfb650b87f4db3a0b635ac8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sevc host.exe\" .." sevc host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\7bfa60839bfb650b87f4db3a0b635ac8 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\sevc host.exe\" .." sevc host.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1512-64-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe behavioral1/memory/1512-66-0x0000000000400000-0x00000000004C4000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 1528 j.exe 1528 j.exe 1528 j.exe 2044 sevc host.exe 2044 sevc host.exe 2044 sevc host.exe 2044 sevc host.exe 2044 sevc host.exe 2044 sevc host.exe 2044 sevc host.exe 2044 sevc host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2044 sevc host.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2012 Project1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 1440 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1440 AUDIODG.EXE Token: 33 1440 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1440 AUDIODG.EXE Token: SeDebugPrivilege 2044 sevc host.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 Project1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1528 j.exe 2044 sevc host.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1528 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 27 PID 1512 wrote to memory of 1528 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 27 PID 1512 wrote to memory of 1528 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 27 PID 1512 wrote to memory of 1528 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 27 PID 1512 wrote to memory of 2012 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 28 PID 1512 wrote to memory of 2012 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 28 PID 1512 wrote to memory of 2012 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 28 PID 1512 wrote to memory of 2012 1512 7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe 28 PID 1528 wrote to memory of 2044 1528 j.exe 30 PID 1528 wrote to memory of 2044 1528 j.exe 30 PID 1528 wrote to memory of 2044 1528 j.exe 30 PID 1528 wrote to memory of 2044 1528 j.exe 30 PID 2044 wrote to memory of 1712 2044 sevc host.exe 31 PID 2044 wrote to memory of 1712 2044 sevc host.exe 31 PID 2044 wrote to memory of 1712 2044 sevc host.exe 31 PID 2044 wrote to memory of 1712 2044 sevc host.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe"C:\Users\Admin\AppData\Local\Temp\7b488f499dedba12660d63aa78afb84cc3de15a6613c08d9af03d7517a5e97d3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\j.exeC:\Users\Admin\AppData\Local\Temp/j.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\sevc host.exe"C:\Users\Admin\AppData\Local\Temp\sevc host.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\sevc host.exe" "sevc host.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:1712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Project1.exeC:\Users\Admin\AppData\Local\Temp/Project1.exe2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2012
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
891KB
MD5559d93b186c734f3caf6391fdd89df5d
SHA1c84445d6691cbdc738664faf1b536fff47e494d3
SHA256681ecc35b6467e84aeec702e4d12e8265e38306d5350939b977c9187c559b09c
SHA512303d0c5f6188537f708cc2c841c06f8f80d5bea94ae8ebfbddac9dcfd67a40bc4339a5aaf507da9d6c4658191158d7cd0152bf1affdf03de823905cc70ef8a18
-
Filesize
891KB
MD5559d93b186c734f3caf6391fdd89df5d
SHA1c84445d6691cbdc738664faf1b536fff47e494d3
SHA256681ecc35b6467e84aeec702e4d12e8265e38306d5350939b977c9187c559b09c
SHA512303d0c5f6188537f708cc2c841c06f8f80d5bea94ae8ebfbddac9dcfd67a40bc4339a5aaf507da9d6c4658191158d7cd0152bf1affdf03de823905cc70ef8a18
-
Filesize
1.2MB
MD579be90a0d005189bdc1d573c1b18607a
SHA19dd1ad7a437ba9d33cfea91e3429bf3a63a41555
SHA2562285c409141e4a2084df40f391dd1f1d3fe7241a0ddea8620fe464de50da0e16
SHA512afcde85f8e3df95eb683550e7b39b4d93fec45e8aedd3f6d0a904341e0f70990b5594d06625e102312819d3b4e50db5ea78aea958ae651326c0640838c79692e
-
Filesize
1.2MB
MD579be90a0d005189bdc1d573c1b18607a
SHA19dd1ad7a437ba9d33cfea91e3429bf3a63a41555
SHA2562285c409141e4a2084df40f391dd1f1d3fe7241a0ddea8620fe464de50da0e16
SHA512afcde85f8e3df95eb683550e7b39b4d93fec45e8aedd3f6d0a904341e0f70990b5594d06625e102312819d3b4e50db5ea78aea958ae651326c0640838c79692e
-
Filesize
1.2MB
MD579be90a0d005189bdc1d573c1b18607a
SHA19dd1ad7a437ba9d33cfea91e3429bf3a63a41555
SHA2562285c409141e4a2084df40f391dd1f1d3fe7241a0ddea8620fe464de50da0e16
SHA512afcde85f8e3df95eb683550e7b39b4d93fec45e8aedd3f6d0a904341e0f70990b5594d06625e102312819d3b4e50db5ea78aea958ae651326c0640838c79692e
-
Filesize
1.2MB
MD579be90a0d005189bdc1d573c1b18607a
SHA19dd1ad7a437ba9d33cfea91e3429bf3a63a41555
SHA2562285c409141e4a2084df40f391dd1f1d3fe7241a0ddea8620fe464de50da0e16
SHA512afcde85f8e3df95eb683550e7b39b4d93fec45e8aedd3f6d0a904341e0f70990b5594d06625e102312819d3b4e50db5ea78aea958ae651326c0640838c79692e
-
Filesize
891KB
MD5559d93b186c734f3caf6391fdd89df5d
SHA1c84445d6691cbdc738664faf1b536fff47e494d3
SHA256681ecc35b6467e84aeec702e4d12e8265e38306d5350939b977c9187c559b09c
SHA512303d0c5f6188537f708cc2c841c06f8f80d5bea94ae8ebfbddac9dcfd67a40bc4339a5aaf507da9d6c4658191158d7cd0152bf1affdf03de823905cc70ef8a18
-
Filesize
891KB
MD5559d93b186c734f3caf6391fdd89df5d
SHA1c84445d6691cbdc738664faf1b536fff47e494d3
SHA256681ecc35b6467e84aeec702e4d12e8265e38306d5350939b977c9187c559b09c
SHA512303d0c5f6188537f708cc2c841c06f8f80d5bea94ae8ebfbddac9dcfd67a40bc4339a5aaf507da9d6c4658191158d7cd0152bf1affdf03de823905cc70ef8a18
-
Filesize
1.2MB
MD579be90a0d005189bdc1d573c1b18607a
SHA19dd1ad7a437ba9d33cfea91e3429bf3a63a41555
SHA2562285c409141e4a2084df40f391dd1f1d3fe7241a0ddea8620fe464de50da0e16
SHA512afcde85f8e3df95eb683550e7b39b4d93fec45e8aedd3f6d0a904341e0f70990b5594d06625e102312819d3b4e50db5ea78aea958ae651326c0640838c79692e
-
Filesize
1.2MB
MD579be90a0d005189bdc1d573c1b18607a
SHA19dd1ad7a437ba9d33cfea91e3429bf3a63a41555
SHA2562285c409141e4a2084df40f391dd1f1d3fe7241a0ddea8620fe464de50da0e16
SHA512afcde85f8e3df95eb683550e7b39b4d93fec45e8aedd3f6d0a904341e0f70990b5594d06625e102312819d3b4e50db5ea78aea958ae651326c0640838c79692e