Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-03-2021 21:26
Static task
static1
Behavioral task
behavioral1
Sample
a2eb1bd8d9ebddb661200dc562a76a63.exe
Resource
win7v20201028
General
-
Target
a2eb1bd8d9ebddb661200dc562a76a63.exe
-
Size
611KB
-
MD5
a2eb1bd8d9ebddb661200dc562a76a63
-
SHA1
3f48a72352a35fc272fc6ce49d0a49370ac98859
-
SHA256
f1a58944929b74a4b66d98c5ffb19a830cea082c7a3058bb2e8e8adeac2c83e9
-
SHA512
276f56da79ef9e2ac28464e4da094993087a20a370dfd3e5b024a39de0fa0810b7bdd15fba91077d5d17faa09ea40b94839d73c3a8b41903a1e2949cca54486c
Malware Config
Signatures
-
DarkTrack Payload 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x00040000000130dc-4.dat family_darktrack behavioral1/files/0x00040000000130dc-7.dat family_darktrack behavioral1/files/0x00040000000130dc-5.dat family_darktrack -
Executes dropped EXE 1 IoCs
Processes:
legit.exepid Process 1440 legit.exe -
Loads dropped DLL 2 IoCs
Processes:
a2eb1bd8d9ebddb661200dc562a76a63.exepid Process 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
legit.exepid Process 1440 legit.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
a2eb1bd8d9ebddb661200dc562a76a63.exelegit.exedescription pid Process procid_target PID 1932 wrote to memory of 1224 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 26 PID 1932 wrote to memory of 1224 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 26 PID 1932 wrote to memory of 1224 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 26 PID 1932 wrote to memory of 1224 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 26 PID 1932 wrote to memory of 1440 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 28 PID 1932 wrote to memory of 1440 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 28 PID 1932 wrote to memory of 1440 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 28 PID 1932 wrote to memory of 1440 1932 a2eb1bd8d9ebddb661200dc562a76a63.exe 28 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29 PID 1440 wrote to memory of 1984 1440 legit.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2eb1bd8d9ebddb661200dc562a76a63.exe"C:\Users\Admin\AppData\Local\Temp\a2eb1bd8d9ebddb661200dc562a76a63.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A2EB1B~1.EXE >> NUL2⤵PID:1224
-
-
C:\Users\Admin\AppData\Roaming\legit.exe"C:\Users\Admin\AppData\Roaming\legit.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:1984
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a2eb1bd8d9ebddb661200dc562a76a63
SHA13f48a72352a35fc272fc6ce49d0a49370ac98859
SHA256f1a58944929b74a4b66d98c5ffb19a830cea082c7a3058bb2e8e8adeac2c83e9
SHA512276f56da79ef9e2ac28464e4da094993087a20a370dfd3e5b024a39de0fa0810b7bdd15fba91077d5d17faa09ea40b94839d73c3a8b41903a1e2949cca54486c
-
MD5
a2eb1bd8d9ebddb661200dc562a76a63
SHA13f48a72352a35fc272fc6ce49d0a49370ac98859
SHA256f1a58944929b74a4b66d98c5ffb19a830cea082c7a3058bb2e8e8adeac2c83e9
SHA512276f56da79ef9e2ac28464e4da094993087a20a370dfd3e5b024a39de0fa0810b7bdd15fba91077d5d17faa09ea40b94839d73c3a8b41903a1e2949cca54486c
-
MD5
a2eb1bd8d9ebddb661200dc562a76a63
SHA13f48a72352a35fc272fc6ce49d0a49370ac98859
SHA256f1a58944929b74a4b66d98c5ffb19a830cea082c7a3058bb2e8e8adeac2c83e9
SHA512276f56da79ef9e2ac28464e4da094993087a20a370dfd3e5b024a39de0fa0810b7bdd15fba91077d5d17faa09ea40b94839d73c3a8b41903a1e2949cca54486c