Analysis
-
max time kernel
336s -
max time network
363s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 17:52
Static task
static1
Behavioral task
behavioral1
Sample
f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
Resource
win10v2004-20221111-en
General
-
Target
f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe
-
Size
407KB
-
MD5
9239e490e9c53e2836a2b5036b8c2799
-
SHA1
63d0b7ec9f6299b59c0facaacc9ee22bddac9539
-
SHA256
f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499
-
SHA512
c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235
-
SSDEEP
6144:w7eGar3Vjb57Yc1OwrjnU6s0sQkWRxSAMO8Wqhhy6JdMMrYIEadcM:wippbtb7a0zkbg8Wqhh7prcadn
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1300 apocalyps32.exe 4352 apocalyps32.exe 3400 apocalyps32.exe 4816 apocalyps32.exe 2404 apocalyps32.exe -
resource yara_rule behavioral2/memory/2404-207-0x0000000040010000-0x000000004004B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Windows\\TEMP\\services.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msmmsgr = "C:\\Windows\\TEMP\\x\\services.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\? f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe File created C:\Windows\SysWOW64\? apocalyps32.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2528 set thread context of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 3632 set thread context of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 4888 set thread context of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 3120 set thread context of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 1300 set thread context of 4352 1300 apocalyps32.exe 92 PID 4352 set thread context of 3400 4352 apocalyps32.exe 93 PID 3400 set thread context of 4816 3400 apocalyps32.exe 94 PID 4816 set thread context of 2404 4816 apocalyps32.exe 95 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe File opened for modification C:\Windows\apocalyps32.exe f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe File opened for modification C:\Windows\apocalyps32.exe apocalyps32.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 3560 reg.exe 1136 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 1300 apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 2528 wrote to memory of 3632 2528 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 81 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 3632 wrote to memory of 4888 3632 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 82 PID 4888 wrote to memory of 4592 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 83 PID 4888 wrote to memory of 4592 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 83 PID 4888 wrote to memory of 4592 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 83 PID 4888 wrote to memory of 2800 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 88 PID 4888 wrote to memory of 2800 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 88 PID 4888 wrote to memory of 2800 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 88 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 4888 wrote to memory of 3120 4888 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 86 PID 2800 wrote to memory of 3560 2800 cmd.exe 87 PID 2800 wrote to memory of 3560 2800 cmd.exe 87 PID 2800 wrote to memory of 3560 2800 cmd.exe 87 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 3120 wrote to memory of 4836 3120 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 89 PID 4592 wrote to memory of 1136 4592 cmd.exe 90 PID 4592 wrote to memory of 1136 4592 cmd.exe 90 PID 4592 wrote to memory of 1136 4592 cmd.exe 90 PID 4836 wrote to memory of 1300 4836 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 91 PID 4836 wrote to memory of 1300 4836 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 91 PID 4836 wrote to memory of 1300 4836 f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe 91 PID 1300 wrote to memory of 4352 1300 apocalyps32.exe 92 PID 1300 wrote to memory of 4352 1300 apocalyps32.exe 92 PID 1300 wrote to memory of 4352 1300 apocalyps32.exe 92 PID 1300 wrote to memory of 4352 1300 apocalyps32.exe 92 PID 1300 wrote to memory of 4352 1300 apocalyps32.exe 92 PID 1300 wrote to memory of 4352 1300 apocalyps32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe"C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe"C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exeC:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:1136
-
-
-
C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exeC:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exeC:\Users\Admin\AppData\Local\Temp\f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499.exe5⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\apocalyps32.exe-bs6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\apocalyps32.exe"C:\Windows\apocalyps32.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4352 -
C:\Windows\apocalyps32.exeC:\Windows\apocalyps32.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3400 -
C:\Windows\apocalyps32.exeC:\Windows\apocalyps32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4816 -
C:\Windows\apocalyps32.exeC:\Windows\apocalyps32.exe10⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"11⤵PID:448
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2800
-
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f1⤵
- Adds Run key to start application
- Modifies registry key
PID:3560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD59239e490e9c53e2836a2b5036b8c2799
SHA163d0b7ec9f6299b59c0facaacc9ee22bddac9539
SHA256f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499
SHA512c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235
-
Filesize
407KB
MD59239e490e9c53e2836a2b5036b8c2799
SHA163d0b7ec9f6299b59c0facaacc9ee22bddac9539
SHA256f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499
SHA512c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235
-
Filesize
407KB
MD59239e490e9c53e2836a2b5036b8c2799
SHA163d0b7ec9f6299b59c0facaacc9ee22bddac9539
SHA256f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499
SHA512c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235
-
Filesize
407KB
MD59239e490e9c53e2836a2b5036b8c2799
SHA163d0b7ec9f6299b59c0facaacc9ee22bddac9539
SHA256f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499
SHA512c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235
-
Filesize
407KB
MD59239e490e9c53e2836a2b5036b8c2799
SHA163d0b7ec9f6299b59c0facaacc9ee22bddac9539
SHA256f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499
SHA512c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235
-
Filesize
407KB
MD59239e490e9c53e2836a2b5036b8c2799
SHA163d0b7ec9f6299b59c0facaacc9ee22bddac9539
SHA256f899cd7b20b8147bb975b8568b55b482c154331cd756d2164a00fc8047018499
SHA512c787194fcbb60f52d19ebe384f68080d8fd3d5362e094d2b00aed0b5135884ede14461c79f0fbef0e6f52fecfdec24ab0b951a9b910085d039e06813c74e2235