Analysis
-
max time kernel
164s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-02-2023 19:22
Behavioral task
behavioral1
Sample
77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe
Resource
win10v2004-20221111-en
General
-
Target
77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe
-
Size
836KB
-
MD5
2945eb45067d39df1d37504d692c9fec
-
SHA1
e7f3b576fb2d455a4428dc4ebde7bfafc4da1b60
-
SHA256
77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e
-
SHA512
f1ec05874f0759d33463d6c2d0b3c3ada36f6f628e28f7e2abb57d13a78e1f1b0bc8433328eaead5ef0b084a79d1ae8f2e532c0ecc3f72523d3c558c4307ed9a
-
SSDEEP
12288:wCWAgK7+OPpibO9Ntm0gpy456IElQUnByNfJvSdfDzNSjYcwhtGL0iIzg:QYqsNtm0ggiaQ0BybvinmYSLO
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exedescription ioc process File opened (read-only) \??\B: 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 8 IoCs
Processes:
77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.gho 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.gho\ = "Ghost" 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Ghost 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Ghost\ = "Ghost ????" 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Ghost\shell\open\command 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Ghost\shell 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Ghost\shell\open 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Ghost\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\776968~1.EXE \"%1\"" 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exepid process 1100 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exepid process 1100 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe 1100 77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe"C:\Users\Admin\AppData\Local\Temp\77696865fc5ae8c2161965e98b810f815b715bd2efe7e1fc1603da85071eab9e.exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1100