Analysis
-
max time kernel
135s -
max time network
141s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 01:46
Static task
static1
Behavioral task
behavioral1
Sample
8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exe
Resource
win10v20210410
General
-
Target
8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exe
-
Size
103KB
-
MD5
f9f4b90f53eb22249e2fbd4d598be6c3
-
SHA1
05e5fe941e26b75c33ce8b5eab6c15c64ba44ed9
-
SHA256
8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516
-
SHA512
2ed3e66651733dde2d0b120dcb6404ad516ae00fe684c6c09c3c436763f7b33d4f45fe34186cfc41041e5a6ff5b3129556458e2a0c1ecb36a581d4719dbff5de
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\lZxfOj.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\lZxfOj.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
lZxfOj.exepid process 4000 lZxfOj.exe -
Drops file in Program Files directory 64 IoCs
Processes:
lZxfOj.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE lZxfOj.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUM1CBD.tmp\GoogleUpdateSetup.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE lZxfOj.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jjs.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_1.4.101.0_x64__8wekyb3d8bbwe\Microsoft.StickyNotes.exe lZxfOj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe lZxfOj.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Solitaire.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE lZxfOj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe lZxfOj.exe File opened for modification C:\Program Files\Windows Defender\NisSrv.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe lZxfOj.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe lZxfOj.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\89.0.4389.114_chrome_installer.exe lZxfOj.exe File opened for modification C:\Program Files\7-Zip\7zG.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\tnameserv.exe lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_1.0.45.0_x64__8wekyb3d8bbwe\PurchaseApp.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\keytool.exe lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Calculator.exe lZxfOj.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{E687748C-6A62-4AE0-B6D7-7B85689627E9}\89.0.4389.114_chrome_installer.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ktab.exe lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\HxMail.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe lZxfOj.exe File opened for modification C:\Program Files\Windows Defender\MsMpEng.exe lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeHost.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe lZxfOj.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe lZxfOj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe lZxfOj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe lZxfOj.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jjs.exe lZxfOj.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe lZxfOj.exe File opened for modification C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe lZxfOj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe lZxfOj.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe lZxfOj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\XboxApp.exe lZxfOj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.14.2002.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE lZxfOj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE lZxfOj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exelZxfOj.exedescription pid process target process PID 3964 wrote to memory of 4000 3964 8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exe lZxfOj.exe PID 3964 wrote to memory of 4000 3964 8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exe lZxfOj.exe PID 3964 wrote to memory of 4000 3964 8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exe lZxfOj.exe PID 4000 wrote to memory of 4036 4000 lZxfOj.exe cmd.exe PID 4000 wrote to memory of 4036 4000 lZxfOj.exe cmd.exe PID 4000 wrote to memory of 4036 4000 lZxfOj.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exe"C:\Users\Admin\AppData\Local\Temp\8e007b1ddcac1e2703be9b74f97f80c713eb36990e2085e3fbbd02f18f93f516.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lZxfOj.exeC:\Users\Admin\AppData\Local\Temp\lZxfOj.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\630546fa.bat" "3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\630546fa.batMD5
690ca2483437b717fb1acf5edfb4729f
SHA12f2dffac4ca8bd9a8b1efe63a452f557e8535ea7
SHA256d85e149b591668312b4ba2e1358758f7fa4485950d095cc9e98974e1897fd88e
SHA5127521f756a33a291e10687c1c49772ff9830f9627259593a92d83ca0496a3c11d9134ceabf34086409eb8771e83f35fe9fad2a25be0ff692622bc0c6a212049c1
-
C:\Users\Admin\AppData\Local\Temp\lZxfOj.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
C:\Users\Admin\AppData\Local\Temp\lZxfOj.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
memory/4000-114-0x0000000000000000-mapping.dmp
-
memory/4036-117-0x0000000000000000-mapping.dmp