Analysis

  • max time kernel
    136s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-07-2021 06:20

General

  • Target

    b719cba1a8c6e43a6f106a57b04962e4.exe

  • Size

    1.4MB

  • MD5

    b719cba1a8c6e43a6f106a57b04962e4

  • SHA1

    80363428f99500ca7da13ad4ff5b07a97627507f

  • SHA256

    82d440b0f4ab1630e2e2cfe49a04ea383657ef055b33fb86db7aaa8131e2933b

  • SHA512

    0411ed00195a9bde7710718939af58a8a090d5db924e4317b499ee89dc6f1e83908045e787e36237887df738351de310b1c61da99b8df702f0033b0255935264

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b719cba1a8c6e43a6f106a57b04962e4.exe
    "C:\Users\Admin\AppData\Local\Temp\b719cba1a8c6e43a6f106a57b04962e4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cmd < Pura.vssm
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V /R "^mDHHnooFzwuKWdLxXAvOmqexElRneQaCvwawdMkcQdyHAkGxAHZauWenBjehsKCCIDhUYKrkfwXoVxUaEvXxRZvAZTAtJXtuNCYXYLvQENryYTDusKJU$" Cancellata.vssm
          4⤵
            PID:1900
          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com
            Bordatino.exe.com s
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1776
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com
              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com s
              5⤵
              • Executes dropped EXE
              • Drops startup file
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:1720
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exe
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exe
                6⤵
                • Executes dropped EXE
                • Gathers network information
                • Modifies system certificate store
                PID:1172
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 30
            4⤵
            • Runs ping.exe
            PID:1756

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Command-Line Interface

    1
    T1059

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    2
    T1082

    Remote System Discovery

    1
    T1018

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Cancellata.vssm
      MD5

      109e6e188cb1ad77da3429a6009249aa

      SHA1

      9ed81e2b0bd55f7e438f006239f5506fb4a416c1

      SHA256

      6f64e592ef82dc57d63af01e83674a5a24c2cc92ab18cb8f9890540dfe84fdb2

      SHA512

      c7f6fd5e0289ba79937a31c972cefe636c45827808a39fdbf81e4323842951d303c739aaea405f784141473ff5c43f43a7d69f8aacf60ccfc8f3b2e6c4adda35

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Era.vssm
      MD5

      cec8939061135d686ced9eba7873d51a

      SHA1

      be692ac4a46f38394b75d3874dec18c4e542755f

      SHA256

      5bdfc21e26db8ad198c143da236894580055144b255c00227268dafc97afc37c

      SHA512

      f2c0f1fa78dc0448c2f234bff0154f051de2281e2180a2c65081a0b05f0d032d2b08f28fb8865ba93021d84d2fa39cd581ba1d9d5e96f8abf54ec3242dcbb935

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pura.vssm
      MD5

      6c9fe73eff8e55c855ce458c652fb937

      SHA1

      37337f6200e7bea84a9aed760efc3b9ac3845153

      SHA256

      3d30821ae38a2bf3cfcb096818059906e5fc6a81fbd7367715074c5740b92807

      SHA512

      47e9432fceb61f98372166af4f621ad0679e98331e55557fd08c056894e0205c9b760d96120440108309e8abfef5128202c60ef64b7be021d6217cb4d4a27266

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ripreso.vssm
      MD5

      2fc0e0bd6c824d35d37d5e1ed6fa1bc8

      SHA1

      0f24df48fcac1ac480fcc956e46f351b9a1d5e7e

      SHA256

      8cbdc958498f239f156d4f42b9707e0db57ed98802485a0bb29b8e8a5c93e02c

      SHA512

      9e8ca655e107a1f314425d2c0eeec1967c1220f8d1fb9a002f140cba9e32707caad08b658d952d732326dd636ce83bd8215603e3413230488c0e98ec622a27be

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exe
      MD5

      cabb20e171770ff64614a54c1f31c033

      SHA1

      ea18043fedaf888f04c07f71f2006f3f479c0b41

      SHA256

      c0e3087d87c84776fe7ffca768a0793c02d28e34a821f0c9da32339af8e7e6a6

      SHA512

      a6a6beff693f2e2c71c0d8e12f6964e789aa4b370c1e0191b2b0ff038801fdb0038a54c0a8f2dbc0d399d2c016f89701c6b6275b3a2b6fa74fb2a5ea817c2d3b

    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\s
      MD5

      2fc0e0bd6c824d35d37d5e1ed6fa1bc8

      SHA1

      0f24df48fcac1ac480fcc956e46f351b9a1d5e7e

      SHA256

      8cbdc958498f239f156d4f42b9707e0db57ed98802485a0bb29b8e8a5c93e02c

      SHA512

      9e8ca655e107a1f314425d2c0eeec1967c1220f8d1fb9a002f140cba9e32707caad08b658d952d732326dd636ce83bd8215603e3413230488c0e98ec622a27be

    • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exe
      MD5

      cabb20e171770ff64614a54c1f31c033

      SHA1

      ea18043fedaf888f04c07f71f2006f3f479c0b41

      SHA256

      c0e3087d87c84776fe7ffca768a0793c02d28e34a821f0c9da32339af8e7e6a6

      SHA512

      a6a6beff693f2e2c71c0d8e12f6964e789aa4b370c1e0191b2b0ff038801fdb0038a54c0a8f2dbc0d399d2c016f89701c6b6275b3a2b6fa74fb2a5ea817c2d3b

    • memory/1172-85-0x0000000000400000-0x0000000000495000-memory.dmp
      Filesize

      596KB

    • memory/1172-81-0x000000000044003F-mapping.dmp
    • memory/1204-61-0x0000000000000000-mapping.dmp
    • memory/1720-79-0x00000000002F0000-0x00000000002F1000-memory.dmp
      Filesize

      4KB

    • memory/1720-84-0x0000000000300000-0x0000000000302000-memory.dmp
      Filesize

      8KB

    • memory/1720-75-0x0000000000000000-mapping.dmp
    • memory/1756-70-0x0000000000000000-mapping.dmp
    • memory/1776-68-0x0000000000000000-mapping.dmp
    • memory/1900-64-0x0000000000000000-mapping.dmp
    • memory/1904-60-0x0000000074FB1000-0x0000000074FB3000-memory.dmp
      Filesize

      8KB

    • memory/1988-63-0x0000000000000000-mapping.dmp