Analysis
-
max time kernel
77s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 00:20
Static task
static1
Behavioral task
behavioral1
Sample
c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe
Resource
win10v2004-20220812-en
General
-
Target
c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe
-
Size
116KB
-
MD5
8f3bdc938cb84ce209a4b522127d053c
-
SHA1
8dabcff7888d9d2716c826fd0bd5c594e867bfaa
-
SHA256
c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5
-
SHA512
641a36f880c833ba6548aa1de3ae795509b93301f48b64d50d02566db6837457679f8f78ca30b1742c9d2691b7b645f03a55a8ac96278ee988df27600cc2c574
-
SSDEEP
3072:g/oEsNNEK/oVQ0nEIgfKDSRGO5508x/haO8T2rSRcz:g/oXLJ/omZ7dg7+z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1520 svvost.exe 1688 winlig.exe -
Loads dropped DLL 4 IoCs
pid Process 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\Fonts\svvost.exe c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe File opened for modification C:\WINDOWS\Fonts\winlig.exe c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1520 svvost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1780 wrote to memory of 948 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 28 PID 1780 wrote to memory of 948 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 28 PID 1780 wrote to memory of 948 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 28 PID 1780 wrote to memory of 948 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 28 PID 948 wrote to memory of 684 948 cmd.exe 30 PID 948 wrote to memory of 684 948 cmd.exe 30 PID 948 wrote to memory of 684 948 cmd.exe 30 PID 948 wrote to memory of 684 948 cmd.exe 30 PID 684 wrote to memory of 1160 684 net.exe 31 PID 684 wrote to memory of 1160 684 net.exe 31 PID 684 wrote to memory of 1160 684 net.exe 31 PID 684 wrote to memory of 1160 684 net.exe 31 PID 1780 wrote to memory of 1520 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 32 PID 1780 wrote to memory of 1520 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 32 PID 1780 wrote to memory of 1520 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 32 PID 1780 wrote to memory of 1520 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 32 PID 1780 wrote to memory of 1688 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 33 PID 1780 wrote to memory of 1688 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 33 PID 1780 wrote to memory of 1688 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 33 PID 1780 wrote to memory of 1688 1780 c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe"C:\Users\Admin\AppData\Local\Temp\c3852859c8e186f7ddd636fcda83a26f2c302672d284039cde53050ff34a5bd5.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵PID:1160
-
-
-
-
C:\WINDOWS\Fonts\svvost.exe"C:\WINDOWS\Fonts\svvost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\WINDOWS\Fonts\winlig.exe"C:\WINDOWS\Fonts\winlig.exe"2⤵
- Executes dropped EXE
PID:1688
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD50b59a3127044768e3eb9f124e46543f2
SHA1c6d1dab3f8b191fd2d43868243f75b023d6050ce
SHA2568b623c47e8cfc1b3f98d956d128adf49a8f7c76e27e5d3bde05ed2c84fba5a4d
SHA5120265a58e5d8fe9de0d51b10a95d02f0ad772c5b7914e32323ab5b902412d70413ac3284292bbcc36e59892e12a50abff5ddfa716aa4eb077af7c89ccf475bc92
-
Filesize
36KB
MD5bd74cfe59c83f8cc6d4066e46af6de63
SHA119220986deb0fa6eb13afa5594d45e8270eb204d
SHA256202fc7e7503e03e6c5bf93aea9b888d9af83fa85407fb23ee3f092267a8d6254
SHA5126534c5f3b6ed203c822c53a20a4f4bd3e682f35ca06efe756f0f06ea8dbef38d82895dde1677d5e071fcaef41cd8e4681df6e40f9db39d88017188b2dbc30072
-
Filesize
13KB
MD50b59a3127044768e3eb9f124e46543f2
SHA1c6d1dab3f8b191fd2d43868243f75b023d6050ce
SHA2568b623c47e8cfc1b3f98d956d128adf49a8f7c76e27e5d3bde05ed2c84fba5a4d
SHA5120265a58e5d8fe9de0d51b10a95d02f0ad772c5b7914e32323ab5b902412d70413ac3284292bbcc36e59892e12a50abff5ddfa716aa4eb077af7c89ccf475bc92
-
Filesize
13KB
MD50b59a3127044768e3eb9f124e46543f2
SHA1c6d1dab3f8b191fd2d43868243f75b023d6050ce
SHA2568b623c47e8cfc1b3f98d956d128adf49a8f7c76e27e5d3bde05ed2c84fba5a4d
SHA5120265a58e5d8fe9de0d51b10a95d02f0ad772c5b7914e32323ab5b902412d70413ac3284292bbcc36e59892e12a50abff5ddfa716aa4eb077af7c89ccf475bc92
-
Filesize
36KB
MD5bd74cfe59c83f8cc6d4066e46af6de63
SHA119220986deb0fa6eb13afa5594d45e8270eb204d
SHA256202fc7e7503e03e6c5bf93aea9b888d9af83fa85407fb23ee3f092267a8d6254
SHA5126534c5f3b6ed203c822c53a20a4f4bd3e682f35ca06efe756f0f06ea8dbef38d82895dde1677d5e071fcaef41cd8e4681df6e40f9db39d88017188b2dbc30072
-
Filesize
36KB
MD5bd74cfe59c83f8cc6d4066e46af6de63
SHA119220986deb0fa6eb13afa5594d45e8270eb204d
SHA256202fc7e7503e03e6c5bf93aea9b888d9af83fa85407fb23ee3f092267a8d6254
SHA5126534c5f3b6ed203c822c53a20a4f4bd3e682f35ca06efe756f0f06ea8dbef38d82895dde1677d5e071fcaef41cd8e4681df6e40f9db39d88017188b2dbc30072