Resubmissions
18-04-2021 01:04
210418-l61gq8jtsa 818-04-2021 01:01
210418-y7pbs19h3j 807-04-2021 00:47
210407-dyc6ed67ws 807-04-2021 00:43
210407-2h6x9trgc2 8Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
07-04-2021 00:43
Static task
static1
Behavioral task
behavioral1
Sample
2020_21_S2_A2.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
2020_21_S2_A2.exe
Resource
win10v20201028
General
-
Target
2020_21_S2_A2.exe
-
Size
75KB
-
MD5
603638e373770eab32b41fac447754e8
-
SHA1
fcec650c8784dfeb08e868c08be347f9d4d9a53b
-
SHA256
5fd9a8605221ee520a11865a5b07c9b37c894acb8e38a2965fb3f31d02bdeedc
-
SHA512
d83d7062aedb4eb77642aa91fb20c7159e403b87ea6de9c2487bec3739f2eac1dc86d40debca66cb9d93a71d43cd0869c2efbe7cf28deae9634add6387d3234b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
FYZGWGKb.exepid process 852 FYZGWGKb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
FYZGWGKb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Update = "C:\\FYZGWGKb.exe" FYZGWGKb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2020_21_S2_A2.exedescription pid process target process PID 1144 wrote to memory of 852 1144 2020_21_S2_A2.exe FYZGWGKb.exe PID 1144 wrote to memory of 852 1144 2020_21_S2_A2.exe FYZGWGKb.exe PID 1144 wrote to memory of 852 1144 2020_21_S2_A2.exe FYZGWGKb.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
603638e373770eab32b41fac447754e8
SHA1fcec650c8784dfeb08e868c08be347f9d4d9a53b
SHA2565fd9a8605221ee520a11865a5b07c9b37c894acb8e38a2965fb3f31d02bdeedc
SHA512d83d7062aedb4eb77642aa91fb20c7159e403b87ea6de9c2487bec3739f2eac1dc86d40debca66cb9d93a71d43cd0869c2efbe7cf28deae9634add6387d3234b
-
MD5
603638e373770eab32b41fac447754e8
SHA1fcec650c8784dfeb08e868c08be347f9d4d9a53b
SHA2565fd9a8605221ee520a11865a5b07c9b37c894acb8e38a2965fb3f31d02bdeedc
SHA512d83d7062aedb4eb77642aa91fb20c7159e403b87ea6de9c2487bec3739f2eac1dc86d40debca66cb9d93a71d43cd0869c2efbe7cf28deae9634add6387d3234b