Analysis
-
max time kernel
147s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 23:04
Static task
static1
Behavioral task
behavioral1
Sample
867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe
Resource
win10v2004-20220812-en
General
-
Target
867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe
-
Size
544KB
-
MD5
6fa77feaddddbd4f2a141337a56e6a60
-
SHA1
648cd353eeef00ebb2f8cd72fb54206799910bc4
-
SHA256
867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
-
SHA512
664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca
-
SSDEEP
3072:wuFAlQ80NH5ZVulAOL8OzsFxEgCBVa0edQOcJq99zgcRLQaA9waCuqQpa1Sp1VNd:bHNH5ZA8vIwQOb99zMdwI61gB4Q
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1348 svchost.exe 1000 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1928 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 1928 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2036 set thread context of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 1348 set thread context of 1000 1348 svchost.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 1348 svchost.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 2036 wrote to memory of 1928 2036 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 28 PID 1928 wrote to memory of 1348 1928 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 29 PID 1928 wrote to memory of 1348 1928 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 29 PID 1928 wrote to memory of 1348 1928 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 29 PID 1928 wrote to memory of 1348 1928 867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe 29 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30 PID 1348 wrote to memory of 1000 1348 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe"C:\Users\Admin\AppData\Local\Temp\867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe"C:\Users\Admin\AppData\Local\Temp\867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:1000
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD56fa77feaddddbd4f2a141337a56e6a60
SHA1648cd353eeef00ebb2f8cd72fb54206799910bc4
SHA256867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
SHA512664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca
-
Filesize
544KB
MD56fa77feaddddbd4f2a141337a56e6a60
SHA1648cd353eeef00ebb2f8cd72fb54206799910bc4
SHA256867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
SHA512664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca
-
Filesize
544KB
MD56fa77feaddddbd4f2a141337a56e6a60
SHA1648cd353eeef00ebb2f8cd72fb54206799910bc4
SHA256867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
SHA512664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca
-
Filesize
544KB
MD56fa77feaddddbd4f2a141337a56e6a60
SHA1648cd353eeef00ebb2f8cd72fb54206799910bc4
SHA256867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
SHA512664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca
-
Filesize
544KB
MD56fa77feaddddbd4f2a141337a56e6a60
SHA1648cd353eeef00ebb2f8cd72fb54206799910bc4
SHA256867c00cabc16c47046eceb613d6fc49cfe75698ad4f000d114c558f5260722ab
SHA512664067108811e099d812197221081905afb6291e1a0469d82464950bc3621e8f1045ffe8f84922e19912da4bfca5366ee412173cff0ca71d2fd1664870f66aca