Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 22:56
Behavioral task
behavioral1
Sample
c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe
Resource
win7-20220812-en
General
-
Target
c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe
-
Size
298KB
-
MD5
37e42f429475beb8d0deefd97e90760b
-
SHA1
4a62929dbf7b3e73851dc3ec31c80a16d7238ead
-
SHA256
c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7
-
SHA512
b291102eb73c742b74a20c7528fcd75232fefc47cc704b542b2550c8a173a001b486f5cde554411ccfddb7f85247d809dc21fb2fa22e14e9ee8283cbbcdc390e
-
SSDEEP
6144:luIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYL:o6Wq4aaE6KwyF5L0Y2D1PqLk
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 svhost.exe -
resource yara_rule behavioral2/files/0x0002000000022e07-133.dat upx behavioral2/files/0x0002000000022e07-134.dat upx behavioral2/memory/5012-135-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2228-136-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/5012-137-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/2228-138-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\x: svhost.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/5012-135-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2228-136-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/5012-137-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/2228-138-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Driver.db svhost.exe File created C:\Windows\svhost.exe c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe 2228 svhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5012 wrote to memory of 2228 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 80 PID 5012 wrote to memory of 2228 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 80 PID 5012 wrote to memory of 2228 5012 c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe"C:\Users\Admin\AppData\Local\Temp\c87e7eba34209ea44f0939561783a56ec72954ed243ef14dbbb0b2f8338bf2c7.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD5f4ce31cf77d1c322fd8c0bd9195ea10a
SHA19a0c336be8e53bf8d1fa76da4227207ea044cecc
SHA256fe22cdc2d607e8588ae569bc437fc06593025b600fbc96db48ac41b976cde15e
SHA512b6f6e36885dd82e6f1ac7ee7fdc1f5b57308dffd437b9be488e1770873567ef6c296e5c3d3613dd078aac8f3a5a681cc33488e6682b5b3e56398531aa0ff975e
-
Filesize
298KB
MD5f4ce31cf77d1c322fd8c0bd9195ea10a
SHA19a0c336be8e53bf8d1fa76da4227207ea044cecc
SHA256fe22cdc2d607e8588ae569bc437fc06593025b600fbc96db48ac41b976cde15e
SHA512b6f6e36885dd82e6f1ac7ee7fdc1f5b57308dffd437b9be488e1770873567ef6c296e5c3d3613dd078aac8f3a5a681cc33488e6682b5b3e56398531aa0ff975e