Analysis
-
max time kernel
176s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 20:02
Behavioral task
behavioral1
Sample
bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe
Resource
win10v2004-20221111-en
General
-
Target
bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe
-
Size
23KB
-
MD5
58642a8345ec12d67c71bbcbd4a8fd4b
-
SHA1
244c49192de17c9352b56f1f82c7551d8c548a98
-
SHA256
bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55
-
SHA512
9be0a5c8c41c3d4d0a4bbe75bd9b287dde91cde0839a9a9bbbf01c19e7d8ee2f520952b08692873b3a76e61aa59d4d5c50d15c6d7e651de41028f9659114132a
-
SSDEEP
384:wd3H9kpiRjk0XgeTXXl6fZpcSaCmLNjN7qnAI2POC13/l3HQ8gs110u6:KOJCV+pE3LNjN7qtCOS/l3Vgs/r6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1236-55-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/1236-57-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\loadwin = "winsys.exe" bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\exporet = "winsys.exe" bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winet.dll bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\winsys.exe bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe File opened for modification C:\Windows\temp1.jpg bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe File created C:\Windows\temp1.jpg bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe File opened for modification C:\Windows\temp1.jpg DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe 1236 bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe"C:\Users\Admin\AppData\Local\Temp\bc3f3c5e41b2cb23d35e1a3a2d041dab2f3ef8ab7fa8a59fce839c8f08e97b55.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1236
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5b409cee5bf5f8e53bed3961ab606e499
SHA1fa1f216bef0fceb8c9e4bfbd9ff4fac51d7c7452
SHA2560804ea5237d3a801b891aa526175dc45ba78c3adc53655b6f92113d29633aadb
SHA512ca132eb62d9290903226b3ce32a6e81131fb2bc317190a22f190a54b79e3c036e19b2ad55d791b593ab796570ee603739f23e455ca4ccd79732039e4aacda4bb