Analysis
-
max time kernel
3s -
max time network
3s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
07-01-2021 19:34
Static task
static1
Behavioral task
behavioral1
Sample
atikmdag-patcher 1.4.8.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
atikmdag-patcher 1.4.8.exe
Resource
win10v20201028
General
-
Target
atikmdag-patcher 1.4.8.exe
-
Size
3.3MB
-
MD5
e0b3da406726f5b5636600fd5dad46e1
-
SHA1
b31d2916c200e2b1672ce2d0080a23d4e77e5092
-
SHA256
16bbaa4003bd7b0ee00634113bd4da02b153f09817263dda98bb06d012c18d74
-
SHA512
98920dcc4fa7d2b111f408ed27ccafd1aaa19ebf0ef57f8b0a36bd7c305339101c22d5d2d7689417f70aafbf6e878d2c660736c3b7905622962d33ca4d5ee48c
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
atikmdag-patcher 1.4.8.tmpatikmdag-patcher 1.4.8.tmpatikmdag-patcher 1.4.8.exehalving.exepid process 4008 atikmdag-patcher 1.4.8.tmp 3052 atikmdag-patcher 1.4.8.tmp 2824 atikmdag-patcher 1.4.8.exe 816 halving.exe -
Loads dropped DLL 1 IoCs
Processes:
halving.exepid process 816 halving.exe -
Drops file in Program Files directory 6 IoCs
Processes:
atikmdag-patcher 1.4.8.tmpdescription ioc process File opened for modification C:\Program Files (x86)\My Program\halving.exe atikmdag-patcher 1.4.8.tmp File created C:\Program Files (x86)\My Program\is-AMKN5.tmp atikmdag-patcher 1.4.8.tmp File created C:\Program Files (x86)\My Program\is-FKB2N.tmp atikmdag-patcher 1.4.8.tmp File created C:\Program Files (x86)\My Program\is-K4D0O.tmp atikmdag-patcher 1.4.8.tmp File opened for modification C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.8.exe atikmdag-patcher 1.4.8.tmp File opened for modification C:\Program Files (x86)\My Program\doks.dll atikmdag-patcher 1.4.8.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
atikmdag-patcher 1.4.8.tmppid process 3052 atikmdag-patcher 1.4.8.tmp 3052 atikmdag-patcher 1.4.8.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
atikmdag-patcher 1.4.8.tmppid process 3052 atikmdag-patcher 1.4.8.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
atikmdag-patcher 1.4.8.exeatikmdag-patcher 1.4.8.tmpatikmdag-patcher 1.4.8.exeatikmdag-patcher 1.4.8.tmpdescription pid process target process PID 8 wrote to memory of 4008 8 atikmdag-patcher 1.4.8.exe atikmdag-patcher 1.4.8.tmp PID 8 wrote to memory of 4008 8 atikmdag-patcher 1.4.8.exe atikmdag-patcher 1.4.8.tmp PID 8 wrote to memory of 4008 8 atikmdag-patcher 1.4.8.exe atikmdag-patcher 1.4.8.tmp PID 4008 wrote to memory of 3240 4008 atikmdag-patcher 1.4.8.tmp atikmdag-patcher 1.4.8.exe PID 4008 wrote to memory of 3240 4008 atikmdag-patcher 1.4.8.tmp atikmdag-patcher 1.4.8.exe PID 4008 wrote to memory of 3240 4008 atikmdag-patcher 1.4.8.tmp atikmdag-patcher 1.4.8.exe PID 3240 wrote to memory of 3052 3240 atikmdag-patcher 1.4.8.exe atikmdag-patcher 1.4.8.tmp PID 3240 wrote to memory of 3052 3240 atikmdag-patcher 1.4.8.exe atikmdag-patcher 1.4.8.tmp PID 3240 wrote to memory of 3052 3240 atikmdag-patcher 1.4.8.exe atikmdag-patcher 1.4.8.tmp PID 3052 wrote to memory of 2824 3052 atikmdag-patcher 1.4.8.tmp atikmdag-patcher 1.4.8.exe PID 3052 wrote to memory of 2824 3052 atikmdag-patcher 1.4.8.tmp atikmdag-patcher 1.4.8.exe PID 3052 wrote to memory of 2824 3052 atikmdag-patcher 1.4.8.tmp atikmdag-patcher 1.4.8.exe PID 3052 wrote to memory of 816 3052 atikmdag-patcher 1.4.8.tmp halving.exe PID 3052 wrote to memory of 816 3052 atikmdag-patcher 1.4.8.tmp halving.exe PID 3052 wrote to memory of 816 3052 atikmdag-patcher 1.4.8.tmp halving.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.8.exe"C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\is-2LC32.tmp\atikmdag-patcher 1.4.8.tmp"C:\Users\Admin\AppData\Local\Temp\is-2LC32.tmp\atikmdag-patcher 1.4.8.tmp" /SL5="$20112,2708435,780800,C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.8.exe"C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.8.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\is-STJJ1.tmp\atikmdag-patcher 1.4.8.tmp"C:\Users\Admin\AppData\Local\Temp\is-STJJ1.tmp\atikmdag-patcher 1.4.8.tmp" /SL5="$30112,2708435,780800,C:\Users\Admin\AppData\Local\Temp\atikmdag-patcher 1.4.8.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.8.exe"C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.8.exe" C:\Program Files (x86)\My Program\atikmdag-patcher 1.4.8.exe5⤵
- Executes dropped EXE
PID:2824 -
C:\Program Files (x86)\My Program\halving.exe"C:\Program Files (x86)\My Program\halving.exe" C:\Program Files (x86)\My Program\halving.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5616e95156f37d4445947144eb72d84b
SHA12ce32920b08f8b6a0959905010b3699fa9111f28
SHA256f3b0e3ba3beb72ad455f478bca6347fbcabbce4ddfa2a6e34f72f11412502434
SHA51227f5a5bbb8dd752b575a74a38ab2aa66c9e714fc9c3e7351005be86c856c6f3cc5bb39835ceb5bd3f7b0f08e4bceb5157970cbf8bd0b927d89b35e042b85552e
-
MD5
5616e95156f37d4445947144eb72d84b
SHA12ce32920b08f8b6a0959905010b3699fa9111f28
SHA256f3b0e3ba3beb72ad455f478bca6347fbcabbce4ddfa2a6e34f72f11412502434
SHA51227f5a5bbb8dd752b575a74a38ab2aa66c9e714fc9c3e7351005be86c856c6f3cc5bb39835ceb5bd3f7b0f08e4bceb5157970cbf8bd0b927d89b35e042b85552e
-
MD5
f6b71aea229a68e2441b2a27996c2cf4
SHA18d088dc36ff403293b3b7da867a7d9952912f553
SHA25672066a937a4c71230759f6e121c7b64c98c08abd649856aa4324e290662f1e5c
SHA512606a1375bc7d6895b9b952cc12a8dec0efb36137c6efe62c03d7f24b2ab6f6b859bcd58199df6640be34fdc601286dcfd66971863c2a384f12405ce7ad3d5f21
-
MD5
16f94b9ee6a8865ebd06f2722d63c5ab
SHA1aced4aa11c89413ffedef1fb72692303b1c9ea5d
SHA256a3a111a7fc2b6f2d056a760e4dffd73116f47aca543516de8a1c05f79fd1aef5
SHA5121b9609b0d4e721158a284fe619620b9e276abeae54202d2339642684ebcbe2eaa4fe588b0271634b81ba58c2d67c46f8d1756b84bda34f6611c6ba84b99d7211
-
MD5
ee5e8a644bb93e5f8be489bb5a967c8b
SHA1d73e389526458acfeb365f3ad44c90444a649c28
SHA256e03acef462cb3ee735b59e18e3774155402503be96875ee7eb16824384b36aee
SHA512a2bc0bb9247d88cd3540e03e4665b5eda98d1123d825d41654ff9e10c0eac50c37fc17a3f0093b86c872fbdbfcda9b72c6ca813eb0ffcf8d904ee56cdc3d7887
-
MD5
db27920346f23c1d742ec0722426417e
SHA1adf18d452653e13ab5518706ea9c4c492a46f4f7
SHA256a43522b8be197d4097bc7a04ac42e7bfb7e085e39969b58d0e4f2e7ff4cbc0f5
SHA51243f57a95c574c92d8d73f9767844681e1a45c7def5dc79848d357a1cf437b7874325af12b72c226fcdd109a9f8824c4e735d515d04b7fa65186604309dad10e5
-
MD5
db27920346f23c1d742ec0722426417e
SHA1adf18d452653e13ab5518706ea9c4c492a46f4f7
SHA256a43522b8be197d4097bc7a04ac42e7bfb7e085e39969b58d0e4f2e7ff4cbc0f5
SHA51243f57a95c574c92d8d73f9767844681e1a45c7def5dc79848d357a1cf437b7874325af12b72c226fcdd109a9f8824c4e735d515d04b7fa65186604309dad10e5
-
MD5
c6702334a6112ad712f069db24d4a189
SHA1f033f867483e775d78890f3756f74d3ea8ae06f7
SHA25620e4004423a22a01ffcbb682d3aaf5a64f141359ae5054fdaeaddd57763c4463
SHA512fc5683ef35f7a50a8cd4d71ef5b58ab96ea5b49dfeda7d1bdeb639e43ccfbb140367eaccaa4d5c216763baf7b0e1f5fd34cf70058c244256a88b094dcd95e21f