Analysis
-
max time kernel
148s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-02-2021 07:18
Static task
static1
Behavioral task
behavioral1
Sample
b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe
Resource
win10v20201028
General
-
Target
b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe
-
Size
5.1MB
-
MD5
bb3d3b2bddc91a0e37fa0eb640e5bbec
-
SHA1
641d3456dc9d0d329a3b28fdc3ba6fb247d1f42d
-
SHA256
b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b
-
SHA512
1f80e87de10bd846c8f8c0eeb8503a6d595c7bad4285b0ed90c299a3a93c21ec2658af93d45a8baa43d4de23ca6129527223e34489e69eb5abfcdaa61d580f8b
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
joined.vmp.exeServer.sfx.exeServer.exeInject32.exepid process 1936 joined.vmp.exe 1272 Server.sfx.exe 1124 Server.exe 748 Inject32.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\joined.vmp.exe vmprotect \Users\Admin\AppData\Local\Temp\joined.vmp.exe vmprotect \Users\Admin\AppData\Local\Temp\joined.vmp.exe vmprotect \Users\Admin\AppData\Local\Temp\joined.vmp.exe vmprotect C:\Users\Admin\AppData\Local\Temp\joined.vmp.exe vmprotect C:\Users\Admin\AppData\Local\Temp\joined.vmp.exe vmprotect -
Drops startup file 2 IoCs
Processes:
Inject32.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe Inject32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe Inject32.exe -
Loads dropped DLL 9 IoCs
Processes:
b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exejoined.vmp.exeServer.sfx.exeServer.exepid process 1684 b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe 1684 b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe 1684 b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe 1684 b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe 1936 joined.vmp.exe 1272 Server.sfx.exe 1272 Server.sfx.exe 1272 Server.sfx.exe 1124 Server.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
joined.vmp.exepid process 1936 joined.vmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
joined.vmp.exepid process 1936 joined.vmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Inject32.exepid process 748 Inject32.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
Processes:
Inject32.exedescription pid process Token: SeDebugPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe Token: 33 748 Inject32.exe Token: SeIncBasePriorityPrivilege 748 Inject32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exejoined.vmp.exeServer.sfx.exeServer.exedescription pid process target process PID 1684 wrote to memory of 1936 1684 b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe joined.vmp.exe PID 1684 wrote to memory of 1936 1684 b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe joined.vmp.exe PID 1684 wrote to memory of 1936 1684 b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe joined.vmp.exe PID 1684 wrote to memory of 1936 1684 b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe joined.vmp.exe PID 1936 wrote to memory of 1272 1936 joined.vmp.exe Server.sfx.exe PID 1936 wrote to memory of 1272 1936 joined.vmp.exe Server.sfx.exe PID 1936 wrote to memory of 1272 1936 joined.vmp.exe Server.sfx.exe PID 1936 wrote to memory of 1272 1936 joined.vmp.exe Server.sfx.exe PID 1936 wrote to memory of 1748 1936 joined.vmp.exe NOTEPAD.EXE PID 1936 wrote to memory of 1748 1936 joined.vmp.exe NOTEPAD.EXE PID 1936 wrote to memory of 1748 1936 joined.vmp.exe NOTEPAD.EXE PID 1936 wrote to memory of 1748 1936 joined.vmp.exe NOTEPAD.EXE PID 1272 wrote to memory of 1124 1272 Server.sfx.exe Server.exe PID 1272 wrote to memory of 1124 1272 Server.sfx.exe Server.exe PID 1272 wrote to memory of 1124 1272 Server.sfx.exe Server.exe PID 1272 wrote to memory of 1124 1272 Server.sfx.exe Server.exe PID 1124 wrote to memory of 748 1124 Server.exe Inject32.exe PID 1124 wrote to memory of 748 1124 Server.exe Inject32.exe PID 1124 wrote to memory of 748 1124 Server.exe Inject32.exe PID 1124 wrote to memory of 748 1124 Server.exe Inject32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe"C:\Users\Admin\AppData\Local\Temp\b655d3b9c40b930c8418be42858df38464ed574350bdef24dc99d1159e688e0b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\joined.vmp.exe"C:\Users\Admin\AppData\Local\Temp\joined.vmp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Server.sfx.exe"C:\Users\Admin\AppData\Local\Temp\Server.sfx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Inject32.exe"C:\Users\Admin\AppData\Local\Temp\Inject32.exe"5⤵
- Executes dropped EXE
- Drops startup file
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\.txt3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\.txtMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\Inject32.exeMD5
92fdab908d9711e7a36872207f0a6a67
SHA1b356e253edaf807059b1ea4a15d8b26e4a8e4c0e
SHA256252795b24c0dabe9d0fca60833faca602cc60e0757f0eae8536a2a5c70a9a43c
SHA5124e3697aabb41c107118d0dc1d29a0b0a169f803d160fbb187f0ea3318eac58fe5623e3a4356fc238dc03483087498c2972e872c0a85bd5545f030ea2edb0b120
-
C:\Users\Admin\AppData\Local\Temp\Inject32.exeMD5
92fdab908d9711e7a36872207f0a6a67
SHA1b356e253edaf807059b1ea4a15d8b26e4a8e4c0e
SHA256252795b24c0dabe9d0fca60833faca602cc60e0757f0eae8536a2a5c70a9a43c
SHA5124e3697aabb41c107118d0dc1d29a0b0a169f803d160fbb187f0ea3318eac58fe5623e3a4356fc238dc03483087498c2972e872c0a85bd5545f030ea2edb0b120
-
C:\Users\Admin\AppData\Local\Temp\Server.exeMD5
92fdab908d9711e7a36872207f0a6a67
SHA1b356e253edaf807059b1ea4a15d8b26e4a8e4c0e
SHA256252795b24c0dabe9d0fca60833faca602cc60e0757f0eae8536a2a5c70a9a43c
SHA5124e3697aabb41c107118d0dc1d29a0b0a169f803d160fbb187f0ea3318eac58fe5623e3a4356fc238dc03483087498c2972e872c0a85bd5545f030ea2edb0b120
-
C:\Users\Admin\AppData\Local\Temp\Server.exeMD5
92fdab908d9711e7a36872207f0a6a67
SHA1b356e253edaf807059b1ea4a15d8b26e4a8e4c0e
SHA256252795b24c0dabe9d0fca60833faca602cc60e0757f0eae8536a2a5c70a9a43c
SHA5124e3697aabb41c107118d0dc1d29a0b0a169f803d160fbb187f0ea3318eac58fe5623e3a4356fc238dc03483087498c2972e872c0a85bd5545f030ea2edb0b120
-
C:\Users\Admin\AppData\Local\Temp\Server.sfx.exeMD5
ef2f61fbe6f5595ca042d395ec9a25fd
SHA199958a935817acaac882de0ef440533b6641cb77
SHA256622903bac5905919baea79ae8143c166c297658b2696a0129aedee6a93e6d6a9
SHA512b34f3f43bb9568e2cc2f54ba2e1bd54e295266c6679b236f1dff7a2beb7f76dff190d4d000e0062e186ad198932b2d13a01762833aaf23c7c01f2e2106587d9e
-
C:\Users\Admin\AppData\Local\Temp\Server.sfx.exeMD5
ef2f61fbe6f5595ca042d395ec9a25fd
SHA199958a935817acaac882de0ef440533b6641cb77
SHA256622903bac5905919baea79ae8143c166c297658b2696a0129aedee6a93e6d6a9
SHA512b34f3f43bb9568e2cc2f54ba2e1bd54e295266c6679b236f1dff7a2beb7f76dff190d4d000e0062e186ad198932b2d13a01762833aaf23c7c01f2e2106587d9e
-
C:\Users\Admin\AppData\Local\Temp\joined.vmp.exeMD5
25c689e345e4f8112008edeeb50e5b54
SHA1bd714c54c874280963f49d9c9b0965afb676368b
SHA2566ec3141a5eef6fc33126818ea4a1dec85358523854a5467543d87e029773d5f9
SHA512acd526c5ba60d43672963dceac8ab151d1e74f3f46180b2f5fbb7be377b7a1aba0ce8116e3f4b93f7beab33d265bdf210335b407d4fd5f1c09c6141a4be621fc
-
C:\Users\Admin\AppData\Local\Temp\joined.vmp.exeMD5
25c689e345e4f8112008edeeb50e5b54
SHA1bd714c54c874280963f49d9c9b0965afb676368b
SHA2566ec3141a5eef6fc33126818ea4a1dec85358523854a5467543d87e029773d5f9
SHA512acd526c5ba60d43672963dceac8ab151d1e74f3f46180b2f5fbb7be377b7a1aba0ce8116e3f4b93f7beab33d265bdf210335b407d4fd5f1c09c6141a4be621fc
-
\Users\Admin\AppData\Local\Temp\Inject32.exeMD5
92fdab908d9711e7a36872207f0a6a67
SHA1b356e253edaf807059b1ea4a15d8b26e4a8e4c0e
SHA256252795b24c0dabe9d0fca60833faca602cc60e0757f0eae8536a2a5c70a9a43c
SHA5124e3697aabb41c107118d0dc1d29a0b0a169f803d160fbb187f0ea3318eac58fe5623e3a4356fc238dc03483087498c2972e872c0a85bd5545f030ea2edb0b120
-
\Users\Admin\AppData\Local\Temp\Server.exeMD5
92fdab908d9711e7a36872207f0a6a67
SHA1b356e253edaf807059b1ea4a15d8b26e4a8e4c0e
SHA256252795b24c0dabe9d0fca60833faca602cc60e0757f0eae8536a2a5c70a9a43c
SHA5124e3697aabb41c107118d0dc1d29a0b0a169f803d160fbb187f0ea3318eac58fe5623e3a4356fc238dc03483087498c2972e872c0a85bd5545f030ea2edb0b120
-
\Users\Admin\AppData\Local\Temp\Server.exeMD5
92fdab908d9711e7a36872207f0a6a67
SHA1b356e253edaf807059b1ea4a15d8b26e4a8e4c0e
SHA256252795b24c0dabe9d0fca60833faca602cc60e0757f0eae8536a2a5c70a9a43c
SHA5124e3697aabb41c107118d0dc1d29a0b0a169f803d160fbb187f0ea3318eac58fe5623e3a4356fc238dc03483087498c2972e872c0a85bd5545f030ea2edb0b120
-
\Users\Admin\AppData\Local\Temp\Server.exeMD5
92fdab908d9711e7a36872207f0a6a67
SHA1b356e253edaf807059b1ea4a15d8b26e4a8e4c0e
SHA256252795b24c0dabe9d0fca60833faca602cc60e0757f0eae8536a2a5c70a9a43c
SHA5124e3697aabb41c107118d0dc1d29a0b0a169f803d160fbb187f0ea3318eac58fe5623e3a4356fc238dc03483087498c2972e872c0a85bd5545f030ea2edb0b120
-
\Users\Admin\AppData\Local\Temp\Server.sfx.exeMD5
ef2f61fbe6f5595ca042d395ec9a25fd
SHA199958a935817acaac882de0ef440533b6641cb77
SHA256622903bac5905919baea79ae8143c166c297658b2696a0129aedee6a93e6d6a9
SHA512b34f3f43bb9568e2cc2f54ba2e1bd54e295266c6679b236f1dff7a2beb7f76dff190d4d000e0062e186ad198932b2d13a01762833aaf23c7c01f2e2106587d9e
-
\Users\Admin\AppData\Local\Temp\joined.vmp.exeMD5
25c689e345e4f8112008edeeb50e5b54
SHA1bd714c54c874280963f49d9c9b0965afb676368b
SHA2566ec3141a5eef6fc33126818ea4a1dec85358523854a5467543d87e029773d5f9
SHA512acd526c5ba60d43672963dceac8ab151d1e74f3f46180b2f5fbb7be377b7a1aba0ce8116e3f4b93f7beab33d265bdf210335b407d4fd5f1c09c6141a4be621fc
-
\Users\Admin\AppData\Local\Temp\joined.vmp.exeMD5
25c689e345e4f8112008edeeb50e5b54
SHA1bd714c54c874280963f49d9c9b0965afb676368b
SHA2566ec3141a5eef6fc33126818ea4a1dec85358523854a5467543d87e029773d5f9
SHA512acd526c5ba60d43672963dceac8ab151d1e74f3f46180b2f5fbb7be377b7a1aba0ce8116e3f4b93f7beab33d265bdf210335b407d4fd5f1c09c6141a4be621fc
-
\Users\Admin\AppData\Local\Temp\joined.vmp.exeMD5
25c689e345e4f8112008edeeb50e5b54
SHA1bd714c54c874280963f49d9c9b0965afb676368b
SHA2566ec3141a5eef6fc33126818ea4a1dec85358523854a5467543d87e029773d5f9
SHA512acd526c5ba60d43672963dceac8ab151d1e74f3f46180b2f5fbb7be377b7a1aba0ce8116e3f4b93f7beab33d265bdf210335b407d4fd5f1c09c6141a4be621fc
-
\Users\Admin\AppData\Local\Temp\joined.vmp.exeMD5
25c689e345e4f8112008edeeb50e5b54
SHA1bd714c54c874280963f49d9c9b0965afb676368b
SHA2566ec3141a5eef6fc33126818ea4a1dec85358523854a5467543d87e029773d5f9
SHA512acd526c5ba60d43672963dceac8ab151d1e74f3f46180b2f5fbb7be377b7a1aba0ce8116e3f4b93f7beab33d265bdf210335b407d4fd5f1c09c6141a4be621fc
-
memory/748-36-0x0000000000B60000-0x0000000000B61000-memory.dmpFilesize
4KB
-
memory/748-32-0x0000000000000000-mapping.dmp
-
memory/1124-25-0x0000000000000000-mapping.dmp
-
memory/1124-30-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/1272-16-0x0000000000000000-mapping.dmp
-
memory/1684-3-0x0000000000F60000-0x0000000001061000-memory.dmpFilesize
1.0MB
-
memory/1684-2-0x00000000756A1000-0x00000000756A3000-memory.dmpFilesize
8KB
-
memory/1748-20-0x0000000000000000-mapping.dmp
-
memory/1936-9-0x0000000000000000-mapping.dmp
-
memory/1936-12-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1936-14-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB