Analysis
-
max time kernel
63s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-04-2021 09:29
Static task
static1
Behavioral task
behavioral1
Sample
main_setup_x86x64.bin.exe
Resource
win7v20210408
General
-
Target
main_setup_x86x64.bin.exe
-
Size
1.8MB
-
MD5
51da3eb43302642233928bd69ca6e219
-
SHA1
7d7d696126bde5e8dbab7382d278e40d22cf47da
-
SHA256
138a3dd2730be8b076caf28f85d3fbd5a987f9587c8b629ca565ac8de1cc9637
-
SHA512
6956d4a9331ad8b6cf563427c36ddf4981f1cdebd30ec8cdbc6ec2845e0f4762ed2c4d8d3285b0bcd18d698569d2067f58e9fa1e22d77d4be97efd97d1898561
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Fresche.exe.comFresche.exe.compid process 1028 Fresche.exe.com 1644 Fresche.exe.com -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 628 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Fresche.exe.comdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Fresche.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Fresche.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
main_setup_x86x64.bin.execmd.execmd.exeFresche.exe.comdescription pid process target process PID 1652 wrote to memory of 1312 1652 main_setup_x86x64.bin.exe makecab.exe PID 1652 wrote to memory of 1312 1652 main_setup_x86x64.bin.exe makecab.exe PID 1652 wrote to memory of 1312 1652 main_setup_x86x64.bin.exe makecab.exe PID 1652 wrote to memory of 1312 1652 main_setup_x86x64.bin.exe makecab.exe PID 1652 wrote to memory of 1992 1652 main_setup_x86x64.bin.exe cmd.exe PID 1652 wrote to memory of 1992 1652 main_setup_x86x64.bin.exe cmd.exe PID 1652 wrote to memory of 1992 1652 main_setup_x86x64.bin.exe cmd.exe PID 1652 wrote to memory of 1992 1652 main_setup_x86x64.bin.exe cmd.exe PID 1992 wrote to memory of 628 1992 cmd.exe cmd.exe PID 1992 wrote to memory of 628 1992 cmd.exe cmd.exe PID 1992 wrote to memory of 628 1992 cmd.exe cmd.exe PID 1992 wrote to memory of 628 1992 cmd.exe cmd.exe PID 628 wrote to memory of 796 628 cmd.exe findstr.exe PID 628 wrote to memory of 796 628 cmd.exe findstr.exe PID 628 wrote to memory of 796 628 cmd.exe findstr.exe PID 628 wrote to memory of 796 628 cmd.exe findstr.exe PID 628 wrote to memory of 1028 628 cmd.exe Fresche.exe.com PID 628 wrote to memory of 1028 628 cmd.exe Fresche.exe.com PID 628 wrote to memory of 1028 628 cmd.exe Fresche.exe.com PID 628 wrote to memory of 1028 628 cmd.exe Fresche.exe.com PID 628 wrote to memory of 1120 628 cmd.exe PING.EXE PID 628 wrote to memory of 1120 628 cmd.exe PING.EXE PID 628 wrote to memory of 1120 628 cmd.exe PING.EXE PID 628 wrote to memory of 1120 628 cmd.exe PING.EXE PID 1028 wrote to memory of 1644 1028 Fresche.exe.com Fresche.exe.com PID 1028 wrote to memory of 1644 1028 Fresche.exe.com Fresche.exe.com PID 1028 wrote to memory of 1644 1028 Fresche.exe.com Fresche.exe.com PID 1028 wrote to memory of 1644 1028 Fresche.exe.com Fresche.exe.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\main_setup_x86x64.bin.exe"C:\Users\Admin\AppData\Local\Temp\main_setup_x86x64.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\makecab.exe"C:\Windows\System32\makecab.exe"2⤵PID:1312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c mtGCHFXHhSVuwQmJLT & EmCeqebftHqwLnhIhSxEfgLn & cmd < Cui.jar2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^PGjCsNUUOkulVUDgTCsLgwbtgnrtaMjQyMxswDFobKDrInIVqUHEnjBNoihSKQBwYdtpmkjfXohDnxcQQitnyHsSkGpTfMbHpBtszncOHsHdZXfOMbeCLrWsZkXTezZlKGxWfrv$" Sete.jar4⤵PID:796
-
-
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.comFresche.exe.com d4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.comC:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.com d5⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1644
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
PID:1120
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Cui.jar
MD574782a69568baa6b7e9c28c2509bc249
SHA11a5fa3fe08641e9d8d7563dedddbf9c1efeed936
SHA256192994d9d03d0d4ac8959de4758d37b1a38ebefdbc2001241172edd193eecbc2
SHA512d7bf2b4824b1904b97a40325fcfea5d2c2a392c761536ecd32ee86d3b5b56108efd0b0744f045a9aaff731b98d3e2f70de45524d019e79b126e45e97352e3bdb
-
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.com
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.com
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Ora.jar
MD5079f8e8f2e14c388746ea548609c4bbd
SHA10bf6e331f374d61fdfe7c4686b9a8f139cbea6bc
SHA2560862c5c2b7cd015d55d89492de8b411bd02950e7deebeb6eab3eade0503d2056
SHA512e9c27e787fbd56d22fffb01180ada7456e6786ab0a3ca0aec8670275bfd31571a136782c79bc6af825a75d0bc5fb607b21152ba79ba7d2ece83e97c4bc9fb6de
-
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Sete.jar
MD522f4d6e3a977155d4be5138c8ca47c7a
SHA121dc8b51d83c446f642bfdddf673ec709d31e7dc
SHA256c6a653d1dc7a142e940cf7446a585354bd45b8de8b161c98de2d336c55299462
SHA5125d302ccba231d9ff4cbc3a0e496b72d8297678f42890e57704f0637cf63fc4da5fb1e5287b1e7bea89521d223b9b4375c04666adb07ae8d0604ca5a089e423f3
-
C:\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Sua.jar
MD54e969bbb36847533d3e748b43c28a0f5
SHA1b3e5582fb2fb042df8c0f2f013f79bfdfb505666
SHA2565e909f9bb0db6c2578633ae116572c6422d91cc129a5be9a5d9944b00cb2dff3
SHA512dc831bc5cd97bd2740237b274c0940f841f882ac85836bc46b7b799746b9ee13572ecc0009546043d5c9dcf87a588dfb627b4ce81a62bf441711b35fb7b03760
-
MD5
4e969bbb36847533d3e748b43c28a0f5
SHA1b3e5582fb2fb042df8c0f2f013f79bfdfb505666
SHA2565e909f9bb0db6c2578633ae116572c6422d91cc129a5be9a5d9944b00cb2dff3
SHA512dc831bc5cd97bd2740237b274c0940f841f882ac85836bc46b7b799746b9ee13572ecc0009546043d5c9dcf87a588dfb627b4ce81a62bf441711b35fb7b03760
-
\Users\Admin\AppData\Roaming\OXsFtCpbcFqWwGmldTZhQlINikRdfndNrRkyyJZyREdShLkkVzZcMkxDgDnSKSiW\Fresche.exe.com
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317