Analysis
-
max time kernel
21s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-05-2021 02:27
Static task
static1
Behavioral task
behavioral1
Sample
8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exe
Resource
win10v20210408
General
-
Target
8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exe
-
Size
42KB
-
MD5
3f44809205336c5d5be3a7e6ac0fd1fd
-
SHA1
2551b29711cc8d8799c2ebf30e792bbdb87db804
-
SHA256
8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c
-
SHA512
5ea019aee3d1e6f6cec321025874d22a4648848e737ff3fa29dd3d85ff7655a74bae0e9136a60219a2ad65042166c34a04a83fabf616e1f28f8b3efb1cc1c626
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\kXQYpOS.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\kXQYpOS.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
kXQYpOS.exepid process 1976 kXQYpOS.exe -
Drops file in Program Files directory 64 IoCs
Processes:
kXQYpOS.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE kXQYpOS.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe kXQYpOS.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\servertool.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe kXQYpOS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\SoundRec.exe kXQYpOS.exe File opened for modification C:\Program Files\7-Zip\7zG.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe kXQYpOS.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE kXQYpOS.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe kXQYpOS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Maps.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jjs.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe kXQYpOS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp.exe kXQYpOS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.14.2002.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe kXQYpOS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Calculator.exe kXQYpOS.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleUpdateCore.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\klist.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE kXQYpOS.exe File opened for modification C:\Program Files\Windows Mail\wab.exe kXQYpOS.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe kXQYpOS.exe File opened for modification C:\Program Files\Windows Defender\MsMpEng.exe kXQYpOS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\onenoteim.exe kXQYpOS.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ktab.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe kXQYpOS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_11.19.19003.0_x64__8wekyb3d8bbwe\XboxIdp.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\java-rmi.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE kXQYpOS.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe kXQYpOS.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE kXQYpOS.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe kXQYpOS.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe kXQYpOS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe kXQYpOS.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUM18A1.tmp\GoogleUpdateSetup.exe kXQYpOS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exekXQYpOS.exedescription pid process target process PID 632 wrote to memory of 1976 632 8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exe kXQYpOS.exe PID 632 wrote to memory of 1976 632 8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exe kXQYpOS.exe PID 632 wrote to memory of 1976 632 8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exe kXQYpOS.exe PID 1976 wrote to memory of 4040 1976 kXQYpOS.exe cmd.exe PID 1976 wrote to memory of 4040 1976 kXQYpOS.exe cmd.exe PID 1976 wrote to memory of 4040 1976 kXQYpOS.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exe"C:\Users\Admin\AppData\Local\Temp\8439722c38e4446745c3288aefa102d2747a733d0da61e913f888e0624f1e86c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kXQYpOS.exeC:\Users\Admin\AppData\Local\Temp\kXQYpOS.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\70435b65.bat" "3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\70435b65.batMD5
590e07884ed909b053b54de06c8eb251
SHA1ef871773725dd6579582690f42233cc7b35b78bf
SHA256cba9b0a1586c139ba35f9afa0a197f2c193fd5356468af92be413e74e7e0b495
SHA51283870e63f7b26d3703416825d8b18c523620991fc20676ee545f522d288e24ca7d7d49ffa0cb41bf2d3d5b1b771d0ca2ef808ca131c5dd58ee18bf2c283fb5b2
-
C:\Users\Admin\AppData\Local\Temp\kXQYpOS.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
C:\Users\Admin\AppData\Local\Temp\kXQYpOS.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
memory/632-117-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/632-118-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1976-114-0x0000000000000000-mapping.dmp
-
memory/4040-119-0x0000000000000000-mapping.dmp