Analysis

  • max time kernel
    150s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2022, 09:54

General

  • Target

    689098765.exe

  • Size

    554KB

  • MD5

    4bd2fdfd3899e2b1f36fcef03e0b38e0

  • SHA1

    53d6ecab71115237d438d1358bc6b7bbeb61fa60

  • SHA256

    427c4da71cee2e61bfa956b79d7947ce4709392a13b9aa1b81d6d813aa19a345

  • SHA512

    1a572c5c0cc76f14b8525651954238911abb746c84013acd1d57a2ca1ead3d632aac11a06d38fd96b6bb506c95ac0a8004c0abce1ebf44ba556bdddbb45b2ea7

  • SSDEEP

    12288:GENN+T5xYrllrU7QY6giFDutOc6duxKLoh52N6oD3piruaVKzd+Gh31:K5xolYQY605ezd+Gh31

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\689098765.exe
    "C:\Users\Admin\AppData\Local\Temp\689098765.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1696
    • \??\c:\users\admin\appdata\local\temp\689098765.exe 
      c:\users\admin\appdata\local\temp\689098765.exe 
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 560
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:868
    • C:\Users\Admin\AppData\Local\icsys.icn.exe
      C:\Users\Admin\AppData\Local\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:548
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:580
        • \??\c:\windows\system\spoolsv.exe
          c:\windows\system\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1120
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1544
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1644
            • C:\Windows\SysWOW64\at.exe
              at 10:56 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
              6⤵
                PID:804
              • C:\Windows\SysWOW64\at.exe
                at 10:57 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                6⤵
                  PID:1716
                • C:\Windows\SysWOW64\at.exe
                  at 10:58 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                  6⤵
                    PID:1496

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\689098765.exe 

          Filesize

          280KB

          MD5

          5f2567f34f2892e3275a5fb90a9118c6

          SHA1

          06119cf0c07b8a318d3c6f36205598f268a18211

          SHA256

          932656e246c295a8d027298f474632d86fd9e91ff1c110a39938be1b862cb520

          SHA512

          dbd089dc448ac1f9212e2d554dead0c35fe4ca0e3fdf87cf020aa38f43454aceab2df19aa8dbb2bc5c9a64446abc76494e132a00d0a8087caf9835ecb63b1a93

        • C:\Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          274KB

          MD5

          68813af202de7e2209562e569af16992

          SHA1

          bf0d9795c2fab2bc36ef5faac12d2f9231563d67

          SHA256

          e8e1f0b7e28d8f689819007042b12653f279d48682d699c81283785e89fda5e0

          SHA512

          908b0b2dfe4835aeb326950f6ef974e783d471baf66525901477634490cff99613c05471d162fa3797f6fa6141d0b613c6e7a591dc4b4066ee8f8dece5237b1d

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          274KB

          MD5

          30594f58f4906ac452a4187f6498f6f8

          SHA1

          e26097178a434083d913ecf0cc25ae8e9586f48a

          SHA256

          ed57655d510df2b130f60caa0f3b515525cfefa1f5ea384037d37430000123e8

          SHA512

          398702d425da018f6400ebcee0d232a780b78ac4c5ccadadf85c396d0b43612ae477568f733faa4f797bd40bb847054c23d9c55e479bc47e86b9832847848e6b

        • C:\Windows\system\explorer.exe

          Filesize

          274KB

          MD5

          dca71741c3f3a67d377ed9be81965a41

          SHA1

          c30db937c3241912646abd59e4810c6d10566bc3

          SHA256

          002755fd5ae034cd4b62178f7e3316b08a2c95fa56a59bd0260c0af0b0839acf

          SHA512

          9844dcc565b6b1a011a81c971c9297506adf87fa24a8c30ff569e7d95c5c35f34d9613edcc03572e258b4bdbf681b58ccd2cb5e1bb867d3557686ddb69e5793e

        • C:\Windows\system\spoolsv.exe

          Filesize

          274KB

          MD5

          a9669f7a11d1c340eb00a7709a8beec1

          SHA1

          b20ffe26b874f8fea91ecce7df0fd688ee92ddc7

          SHA256

          6af262049046f01222b871ffebc2a7908ebed2c8a5ec5d643429d4444a517104

          SHA512

          d4bb70b8377107337b4600294e25bfe3256da8aeba55e30656a2ec3cb0a2c6b9bca402d0f30db27c9cc71ddd0b89f3149e9e008f0f98bc7d4d062b2234f710c2

        • C:\Windows\system\spoolsv.exe

          Filesize

          274KB

          MD5

          a9669f7a11d1c340eb00a7709a8beec1

          SHA1

          b20ffe26b874f8fea91ecce7df0fd688ee92ddc7

          SHA256

          6af262049046f01222b871ffebc2a7908ebed2c8a5ec5d643429d4444a517104

          SHA512

          d4bb70b8377107337b4600294e25bfe3256da8aeba55e30656a2ec3cb0a2c6b9bca402d0f30db27c9cc71ddd0b89f3149e9e008f0f98bc7d4d062b2234f710c2

        • C:\Windows\system\svchost.exe

          Filesize

          274KB

          MD5

          b0facf0fb6594f118e80f61c87f59309

          SHA1

          d3cf13b648fdeaf8bdc69dc2322875499c77021e

          SHA256

          36fdb03529c10d92b4bf17706a1f6c6b7d7c975216bb20461fca97679ca50523

          SHA512

          7f306c0275e18976eb5f564735dd8f1974bb5014152e92f93f30621a33ffd22ee6c3bf485e308ae6a397057e637a51b41f3637b846eb3fda7a4f1ce31d4e9a45

        • \??\c:\users\admin\appdata\local\icsys.icn.exe

          Filesize

          274KB

          MD5

          68813af202de7e2209562e569af16992

          SHA1

          bf0d9795c2fab2bc36ef5faac12d2f9231563d67

          SHA256

          e8e1f0b7e28d8f689819007042b12653f279d48682d699c81283785e89fda5e0

          SHA512

          908b0b2dfe4835aeb326950f6ef974e783d471baf66525901477634490cff99613c05471d162fa3797f6fa6141d0b613c6e7a591dc4b4066ee8f8dece5237b1d

        • \??\c:\users\admin\appdata\local\temp\689098765.exe 

          Filesize

          280KB

          MD5

          5f2567f34f2892e3275a5fb90a9118c6

          SHA1

          06119cf0c07b8a318d3c6f36205598f268a18211

          SHA256

          932656e246c295a8d027298f474632d86fd9e91ff1c110a39938be1b862cb520

          SHA512

          dbd089dc448ac1f9212e2d554dead0c35fe4ca0e3fdf87cf020aa38f43454aceab2df19aa8dbb2bc5c9a64446abc76494e132a00d0a8087caf9835ecb63b1a93

        • \??\c:\windows\system\explorer.exe

          Filesize

          274KB

          MD5

          dca71741c3f3a67d377ed9be81965a41

          SHA1

          c30db937c3241912646abd59e4810c6d10566bc3

          SHA256

          002755fd5ae034cd4b62178f7e3316b08a2c95fa56a59bd0260c0af0b0839acf

          SHA512

          9844dcc565b6b1a011a81c971c9297506adf87fa24a8c30ff569e7d95c5c35f34d9613edcc03572e258b4bdbf681b58ccd2cb5e1bb867d3557686ddb69e5793e

        • \??\c:\windows\system\spoolsv.exe

          Filesize

          274KB

          MD5

          a9669f7a11d1c340eb00a7709a8beec1

          SHA1

          b20ffe26b874f8fea91ecce7df0fd688ee92ddc7

          SHA256

          6af262049046f01222b871ffebc2a7908ebed2c8a5ec5d643429d4444a517104

          SHA512

          d4bb70b8377107337b4600294e25bfe3256da8aeba55e30656a2ec3cb0a2c6b9bca402d0f30db27c9cc71ddd0b89f3149e9e008f0f98bc7d4d062b2234f710c2

        • \??\c:\windows\system\svchost.exe

          Filesize

          274KB

          MD5

          b0facf0fb6594f118e80f61c87f59309

          SHA1

          d3cf13b648fdeaf8bdc69dc2322875499c77021e

          SHA256

          36fdb03529c10d92b4bf17706a1f6c6b7d7c975216bb20461fca97679ca50523

          SHA512

          7f306c0275e18976eb5f564735dd8f1974bb5014152e92f93f30621a33ffd22ee6c3bf485e308ae6a397057e637a51b41f3637b846eb3fda7a4f1ce31d4e9a45

        • \Users\Admin\AppData\Local\Temp\689098765.exe 

          Filesize

          280KB

          MD5

          5f2567f34f2892e3275a5fb90a9118c6

          SHA1

          06119cf0c07b8a318d3c6f36205598f268a18211

          SHA256

          932656e246c295a8d027298f474632d86fd9e91ff1c110a39938be1b862cb520

          SHA512

          dbd089dc448ac1f9212e2d554dead0c35fe4ca0e3fdf87cf020aa38f43454aceab2df19aa8dbb2bc5c9a64446abc76494e132a00d0a8087caf9835ecb63b1a93

        • \Users\Admin\AppData\Local\Temp\689098765.exe 

          Filesize

          280KB

          MD5

          5f2567f34f2892e3275a5fb90a9118c6

          SHA1

          06119cf0c07b8a318d3c6f36205598f268a18211

          SHA256

          932656e246c295a8d027298f474632d86fd9e91ff1c110a39938be1b862cb520

          SHA512

          dbd089dc448ac1f9212e2d554dead0c35fe4ca0e3fdf87cf020aa38f43454aceab2df19aa8dbb2bc5c9a64446abc76494e132a00d0a8087caf9835ecb63b1a93

        • \Users\Admin\AppData\Local\Temp\689098765.exe 

          Filesize

          280KB

          MD5

          5f2567f34f2892e3275a5fb90a9118c6

          SHA1

          06119cf0c07b8a318d3c6f36205598f268a18211

          SHA256

          932656e246c295a8d027298f474632d86fd9e91ff1c110a39938be1b862cb520

          SHA512

          dbd089dc448ac1f9212e2d554dead0c35fe4ca0e3fdf87cf020aa38f43454aceab2df19aa8dbb2bc5c9a64446abc76494e132a00d0a8087caf9835ecb63b1a93

        • \Users\Admin\AppData\Local\Temp\689098765.exe 

          Filesize

          280KB

          MD5

          5f2567f34f2892e3275a5fb90a9118c6

          SHA1

          06119cf0c07b8a318d3c6f36205598f268a18211

          SHA256

          932656e246c295a8d027298f474632d86fd9e91ff1c110a39938be1b862cb520

          SHA512

          dbd089dc448ac1f9212e2d554dead0c35fe4ca0e3fdf87cf020aa38f43454aceab2df19aa8dbb2bc5c9a64446abc76494e132a00d0a8087caf9835ecb63b1a93

        • \Users\Admin\AppData\Local\Temp\689098765.exe 

          Filesize

          280KB

          MD5

          5f2567f34f2892e3275a5fb90a9118c6

          SHA1

          06119cf0c07b8a318d3c6f36205598f268a18211

          SHA256

          932656e246c295a8d027298f474632d86fd9e91ff1c110a39938be1b862cb520

          SHA512

          dbd089dc448ac1f9212e2d554dead0c35fe4ca0e3fdf87cf020aa38f43454aceab2df19aa8dbb2bc5c9a64446abc76494e132a00d0a8087caf9835ecb63b1a93

        • \Users\Admin\AppData\Local\Temp\689098765.exe 

          Filesize

          280KB

          MD5

          5f2567f34f2892e3275a5fb90a9118c6

          SHA1

          06119cf0c07b8a318d3c6f36205598f268a18211

          SHA256

          932656e246c295a8d027298f474632d86fd9e91ff1c110a39938be1b862cb520

          SHA512

          dbd089dc448ac1f9212e2d554dead0c35fe4ca0e3fdf87cf020aa38f43454aceab2df19aa8dbb2bc5c9a64446abc76494e132a00d0a8087caf9835ecb63b1a93

        • \Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          274KB

          MD5

          68813af202de7e2209562e569af16992

          SHA1

          bf0d9795c2fab2bc36ef5faac12d2f9231563d67

          SHA256

          e8e1f0b7e28d8f689819007042b12653f279d48682d699c81283785e89fda5e0

          SHA512

          908b0b2dfe4835aeb326950f6ef974e783d471baf66525901477634490cff99613c05471d162fa3797f6fa6141d0b613c6e7a591dc4b4066ee8f8dece5237b1d

        • \Users\Admin\AppData\Local\icsys.icn.exe

          Filesize

          274KB

          MD5

          68813af202de7e2209562e569af16992

          SHA1

          bf0d9795c2fab2bc36ef5faac12d2f9231563d67

          SHA256

          e8e1f0b7e28d8f689819007042b12653f279d48682d699c81283785e89fda5e0

          SHA512

          908b0b2dfe4835aeb326950f6ef974e783d471baf66525901477634490cff99613c05471d162fa3797f6fa6141d0b613c6e7a591dc4b4066ee8f8dece5237b1d

        • \Windows\system\explorer.exe

          Filesize

          274KB

          MD5

          dca71741c3f3a67d377ed9be81965a41

          SHA1

          c30db937c3241912646abd59e4810c6d10566bc3

          SHA256

          002755fd5ae034cd4b62178f7e3316b08a2c95fa56a59bd0260c0af0b0839acf

          SHA512

          9844dcc565b6b1a011a81c971c9297506adf87fa24a8c30ff569e7d95c5c35f34d9613edcc03572e258b4bdbf681b58ccd2cb5e1bb867d3557686ddb69e5793e

        • \Windows\system\explorer.exe

          Filesize

          274KB

          MD5

          dca71741c3f3a67d377ed9be81965a41

          SHA1

          c30db937c3241912646abd59e4810c6d10566bc3

          SHA256

          002755fd5ae034cd4b62178f7e3316b08a2c95fa56a59bd0260c0af0b0839acf

          SHA512

          9844dcc565b6b1a011a81c971c9297506adf87fa24a8c30ff569e7d95c5c35f34d9613edcc03572e258b4bdbf681b58ccd2cb5e1bb867d3557686ddb69e5793e

        • \Windows\system\spoolsv.exe

          Filesize

          274KB

          MD5

          a9669f7a11d1c340eb00a7709a8beec1

          SHA1

          b20ffe26b874f8fea91ecce7df0fd688ee92ddc7

          SHA256

          6af262049046f01222b871ffebc2a7908ebed2c8a5ec5d643429d4444a517104

          SHA512

          d4bb70b8377107337b4600294e25bfe3256da8aeba55e30656a2ec3cb0a2c6b9bca402d0f30db27c9cc71ddd0b89f3149e9e008f0f98bc7d4d062b2234f710c2

        • \Windows\system\spoolsv.exe

          Filesize

          274KB

          MD5

          a9669f7a11d1c340eb00a7709a8beec1

          SHA1

          b20ffe26b874f8fea91ecce7df0fd688ee92ddc7

          SHA256

          6af262049046f01222b871ffebc2a7908ebed2c8a5ec5d643429d4444a517104

          SHA512

          d4bb70b8377107337b4600294e25bfe3256da8aeba55e30656a2ec3cb0a2c6b9bca402d0f30db27c9cc71ddd0b89f3149e9e008f0f98bc7d4d062b2234f710c2

        • \Windows\system\spoolsv.exe

          Filesize

          274KB

          MD5

          a9669f7a11d1c340eb00a7709a8beec1

          SHA1

          b20ffe26b874f8fea91ecce7df0fd688ee92ddc7

          SHA256

          6af262049046f01222b871ffebc2a7908ebed2c8a5ec5d643429d4444a517104

          SHA512

          d4bb70b8377107337b4600294e25bfe3256da8aeba55e30656a2ec3cb0a2c6b9bca402d0f30db27c9cc71ddd0b89f3149e9e008f0f98bc7d4d062b2234f710c2

        • \Windows\system\spoolsv.exe

          Filesize

          274KB

          MD5

          a9669f7a11d1c340eb00a7709a8beec1

          SHA1

          b20ffe26b874f8fea91ecce7df0fd688ee92ddc7

          SHA256

          6af262049046f01222b871ffebc2a7908ebed2c8a5ec5d643429d4444a517104

          SHA512

          d4bb70b8377107337b4600294e25bfe3256da8aeba55e30656a2ec3cb0a2c6b9bca402d0f30db27c9cc71ddd0b89f3149e9e008f0f98bc7d4d062b2234f710c2

        • \Windows\system\svchost.exe

          Filesize

          274KB

          MD5

          b0facf0fb6594f118e80f61c87f59309

          SHA1

          d3cf13b648fdeaf8bdc69dc2322875499c77021e

          SHA256

          36fdb03529c10d92b4bf17706a1f6c6b7d7c975216bb20461fca97679ca50523

          SHA512

          7f306c0275e18976eb5f564735dd8f1974bb5014152e92f93f30621a33ffd22ee6c3bf485e308ae6a397057e637a51b41f3637b846eb3fda7a4f1ce31d4e9a45

        • \Windows\system\svchost.exe

          Filesize

          274KB

          MD5

          b0facf0fb6594f118e80f61c87f59309

          SHA1

          d3cf13b648fdeaf8bdc69dc2322875499c77021e

          SHA256

          36fdb03529c10d92b4bf17706a1f6c6b7d7c975216bb20461fca97679ca50523

          SHA512

          7f306c0275e18976eb5f564735dd8f1974bb5014152e92f93f30621a33ffd22ee6c3bf485e308ae6a397057e637a51b41f3637b846eb3fda7a4f1ce31d4e9a45

        • memory/548-108-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/548-116-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/580-129-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/580-109-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1120-113-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1120-110-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1544-111-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1544-130-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1644-112-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1696-106-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1696-57-0x00000000760B1000-0x00000000760B3000-memory.dmp

          Filesize

          8KB

        • memory/1696-107-0x0000000002BC0000-0x0000000002BFE000-memory.dmp

          Filesize

          248KB

        • memory/1696-114-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/1984-85-0x0000000000340000-0x000000000038C000-memory.dmp

          Filesize

          304KB