Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe
Resource
win10v2004-20220812-en
General
-
Target
b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe
-
Size
477KB
-
MD5
acf13908b651c82d76391dda3574c6e0
-
SHA1
ff0d66a8e6b6ab2ea79cf5e4962047098b82a4ba
-
SHA256
b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a
-
SHA512
2cc12305e375ff980a6edb39f676a90e249d76becfa0646f90623104a90229fc2af28feb10c08b6e4c32debbdcf9d67aa19e389352e70f7c75358fd9257533bf
-
SSDEEP
12288:w8blFZ0oXr/5NliDenCEkvjnVwEvLPwzJzu9OX2Ukx5vcEi0/3IWV2//c9Yc:w8blFZ0oXrHkjVwEvLPg3/O
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\disableregistrytools = "1" reg.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\config.sys b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SVXHOST = "C:\\Windows\\system32\\svxhost.exe" b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\svxhost.exe b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe File opened for modification C:\Windows\SysWOW64\svxhost.exe b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe File opened for modification C:\WINDOWS\SysWOW64\log.txt b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\fresh.cmd b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe File created C:\WINDOWS\up.cmd b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe File created C:\WINDOWS\syf.cmd b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 1756 regedit.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1948 1376 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 27 PID 1376 wrote to memory of 1948 1376 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 27 PID 1376 wrote to memory of 1948 1376 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 27 PID 1376 wrote to memory of 1948 1376 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 27 PID 1376 wrote to memory of 996 1376 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 28 PID 1376 wrote to memory of 996 1376 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 28 PID 1376 wrote to memory of 996 1376 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 28 PID 1376 wrote to memory of 996 1376 b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe 28 PID 1948 wrote to memory of 544 1948 cmd.exe 32 PID 1948 wrote to memory of 544 1948 cmd.exe 32 PID 1948 wrote to memory of 544 1948 cmd.exe 32 PID 1948 wrote to memory of 544 1948 cmd.exe 32 PID 996 wrote to memory of 1896 996 cmd.exe 31 PID 996 wrote to memory of 1896 996 cmd.exe 31 PID 996 wrote to memory of 1896 996 cmd.exe 31 PID 996 wrote to memory of 1896 996 cmd.exe 31 PID 1896 wrote to memory of 1768 1896 net.exe 33 PID 1896 wrote to memory of 1768 1896 net.exe 33 PID 1896 wrote to memory of 1768 1896 net.exe 33 PID 1896 wrote to memory of 1768 1896 net.exe 33 PID 996 wrote to memory of 1716 996 cmd.exe 34 PID 996 wrote to memory of 1716 996 cmd.exe 34 PID 996 wrote to memory of 1716 996 cmd.exe 34 PID 996 wrote to memory of 1716 996 cmd.exe 34 PID 1716 wrote to memory of 1164 1716 net.exe 35 PID 1716 wrote to memory of 1164 1716 net.exe 35 PID 1716 wrote to memory of 1164 1716 net.exe 35 PID 1716 wrote to memory of 1164 1716 net.exe 35 PID 996 wrote to memory of 1756 996 cmd.exe 36 PID 996 wrote to memory of 1756 996 cmd.exe 36 PID 996 wrote to memory of 1756 996 cmd.exe 36 PID 996 wrote to memory of 1756 996 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe"C:\Users\Admin\AppData\Local\Temp\b77420a16dc2e3bed70e63fb428ff66c51ba35902c4467b86804e43d6d26b03a.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\WINDOWS\syf.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v disableregistrytools /t REG_DWORD /d 1 /f3⤵
- Disables RegEdit via registry modification
PID:544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\WINDOWS\up.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\net.exenet stop Security Center3⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Security Center4⤵PID:1768
-
-
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1164
-
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp.\kij.reg3⤵
- Runs .reg file with regedit
PID:1756
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277B
MD5760776cff6f8d1efeb385795571eab6b
SHA1d46945b4718ec40a04817473db3b3a8aed04e4cf
SHA2567e1d14fa4078548b582f6767d786c82b1162333993ce68ba812a26671f6d0d0c
SHA512cf72f32cd041d2ec728a9099453c4c105b691bd7fd839823e449dc852d39e7d38de61f1856f9e64ef5067cf967903c9a449a41450014507fb9510fbad1f3d3df
-
Filesize
146B
MD598909a52071d95321d93fb925a6a08c6
SHA13005d9f32dbaafd9b635165706cfaf1ee845259f
SHA2566e505012e027a6d94bdbdc62008ed3188cb50768afc8cfa045ea82c4775f4ea9
SHA512ff7cfeebe358375a0f1492d240b47787f5632228fc40cdc606f37c420dbd99b83bd375e77fb4b6f53af7c6990a859f58fdd1d67c4a02ba0fa970fe409de24524
-
Filesize
659B
MD53317900ab5df93f2b01c17e2419c1416
SHA150835be300f4188de57777610bd113e3177b3e78
SHA25650685526578bcbccfbae644ea19d63b3c87a312fecbfde8ca81ed58249a5b6ac
SHA51296bcdd5afcdb97b2d51d25d784824518b7df346189b3f0f43573236e0bd841daeb70a8e1e368d8bc8025a1cef4fac6aebc36382679492c78d4f56b95333b2614