Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 02:10
Static task
static1
Behavioral task
behavioral1
Sample
a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exe
Resource
win10v20210410
General
-
Target
a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exe
-
Size
103KB
-
MD5
d1697be5ce8f02efc39e80a40e581b02
-
SHA1
c9e9be8e9ae48c1a58b09975890a8c117417c533
-
SHA256
a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73
-
SHA512
3b350a388e4853f74d26256276998e54ba8e86471976841fdefebddf7814ce78f1508be557d1729b050b222c7eee74ef4aa537f58b31ed4410948cf2b49949b0
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\vOmfB.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\vOmfB.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
vOmfB.exepid process 648 vOmfB.exe -
Drops file in Program Files directory 64 IoCs
Processes:
vOmfB.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe vOmfB.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\SoundRec.exe vOmfB.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe vOmfB.exe File opened for modification C:\Program Files\7-Zip\7z.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE vOmfB.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe vOmfB.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe vOmfB.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe vOmfB.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_1.0.16328.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe vOmfB.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\orbd.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe vOmfB.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe vOmfB.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE vOmfB.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe vOmfB.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe vOmfB.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE vOmfB.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\HxTsr.exe vOmfB.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsimport.exe vOmfB.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Calculator.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE vOmfB.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe vOmfB.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE vOmfB.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_1.1702.21039.0_x64__8wekyb3d8bbwe\3DViewer.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe vOmfB.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleUpdateCore.exe vOmfB.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe vOmfB.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe vOmfB.exe File opened for modification C:\Program Files\Windows Defender\ConfigSecurityPolicy.exe vOmfB.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUM1CBD.tmp\GoogleUpdateSetup.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe vOmfB.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe vOmfB.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe vOmfB.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.15.2003.0_x64__8wekyb3d8bbwe\GameBar.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe vOmfB.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe vOmfB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exevOmfB.exedescription pid process target process PID 2232 wrote to memory of 648 2232 a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exe vOmfB.exe PID 2232 wrote to memory of 648 2232 a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exe vOmfB.exe PID 2232 wrote to memory of 648 2232 a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exe vOmfB.exe PID 648 wrote to memory of 3152 648 vOmfB.exe cmd.exe PID 648 wrote to memory of 3152 648 vOmfB.exe cmd.exe PID 648 wrote to memory of 3152 648 vOmfB.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exe"C:\Users\Admin\AppData\Local\Temp\a5864cd026a6578ca18c57ae7f81d881d797dd1038375fd520272a5aad9e8e73.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vOmfB.exeC:\Users\Admin\AppData\Local\Temp\vOmfB.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\54b126b7.bat" "3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\54b126b7.batMD5
2b33410b383d1b0d5e03a0ecc740c7ce
SHA19fa3e788d4afc96f57bb0a322947092741fa6368
SHA256a0fe253b7c0ed7bcc06397272e2608ba44ad886e7d1264949208260a74c75fd4
SHA5125beb8c990371d3451d694a5cb84293962af82e04a0beaa7b282bf305e0001f2645b5f0e47c3248bfeda47feb0224d714d4653639f730b872f226aa4dd04ede83
-
C:\Users\Admin\AppData\Local\Temp\vOmfB.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
C:\Users\Admin\AppData\Local\Temp\vOmfB.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
memory/648-114-0x0000000000000000-mapping.dmp
-
memory/3152-117-0x0000000000000000-mapping.dmp