Analysis
-
max time kernel
100s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 11:07
Static task
static1
Behavioral task
behavioral1
Sample
b546cedc_by_Libranalysis.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b546cedc_by_Libranalysis.exe
Resource
win10v20210410
General
-
Target
b546cedc_by_Libranalysis.exe
-
Size
30KB
-
MD5
b546cedcb4435270fc5d6deba093ee84
-
SHA1
c477284f3a5c23df842a76d475ce998c149ac1bd
-
SHA256
30a6f22e80823e7cf9e472d687f4621bc1e9b3cadb9e21db665e15bc43ebafe1
-
SHA512
55b9a64f5bc29d40aab12ed631d52ce9fb33cffbd1469de808e5e96cd31117fd0ee73444044c658a08f7aaa6a071f7aa2e21d5d65d9fa5efed0cafec797ca0da
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\dLMJbkj.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\dLMJbkj.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
dLMJbkj.exepid process 656 dLMJbkj.exe -
Drops file in Program Files directory 64 IoCs
Processes:
dLMJbkj.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe dLMJbkj.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe dLMJbkj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe dLMJbkj.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe dLMJbkj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\onenoteshare.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe dLMJbkj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe dLMJbkj.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe dLMJbkj.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe dLMJbkj.exe File opened for modification C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe dLMJbkj.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe dLMJbkj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\onenoteim.exe dLMJbkj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe dLMJbkj.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe dLMJbkj.exe File opened for modification C:\Program Files\Windows Defender\Offline\OfflineScannerShell.exe dLMJbkj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Video.UI.exe dLMJbkj.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.35.452\GoogleUpdateSetup.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE dLMJbkj.exe File opened for modification C:\Program Files\Windows Mail\wab.exe dLMJbkj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Time.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe dLMJbkj.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe dLMJbkj.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe dLMJbkj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_x64__8wekyb3d8bbwe\Music.UI.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe dLMJbkj.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\HxTsr.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe dLMJbkj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Maps.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE dLMJbkj.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1612.10312.0_x64__8wekyb3d8bbwe\PilotshubApp.exe dLMJbkj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe dLMJbkj.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe dLMJbkj.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE dLMJbkj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b546cedc_by_Libranalysis.exedLMJbkj.exedescription pid process target process PID 1892 wrote to memory of 656 1892 b546cedc_by_Libranalysis.exe dLMJbkj.exe PID 1892 wrote to memory of 656 1892 b546cedc_by_Libranalysis.exe dLMJbkj.exe PID 1892 wrote to memory of 656 1892 b546cedc_by_Libranalysis.exe dLMJbkj.exe PID 656 wrote to memory of 3508 656 dLMJbkj.exe cmd.exe PID 656 wrote to memory of 3508 656 dLMJbkj.exe cmd.exe PID 656 wrote to memory of 3508 656 dLMJbkj.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b546cedc_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\b546cedc_by_Libranalysis.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dLMJbkj.exeC:\Users\Admin\AppData\Local\Temp\dLMJbkj.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\61800ac7.bat" "3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\61800ac7.batMD5
267cfb158b3a85cfcdf6ff5561a00552
SHA18e6d3b510f70cfdcded006769ad0076512917f9a
SHA25633798e1f437aa858375fe207f5fed6380c32b4faf3329bb0d6036172990acef5
SHA51220bf4f7a2b5dd852f2479040eefde928aabaa07d1b813256758dbe52d353acb12e9a4e2827b5606ab79f1877e089550c72595fe3f4cbe1fbd17ef89bdc5b35c1
-
C:\Users\Admin\AppData\Local\Temp\dLMJbkj.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
C:\Users\Admin\AppData\Local\Temp\dLMJbkj.exeMD5
56b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
memory/656-114-0x0000000000000000-mapping.dmp
-
memory/1892-117-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1892-118-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/3508-119-0x0000000000000000-mapping.dmp