Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-07-2021 06:20
Static task
static1
Behavioral task
behavioral1
Sample
b719cba1a8c6e43a6f106a57b04962e4.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b719cba1a8c6e43a6f106a57b04962e4.exe
Resource
win10v20210408
General
-
Target
b719cba1a8c6e43a6f106a57b04962e4.exe
-
Size
1.4MB
-
MD5
b719cba1a8c6e43a6f106a57b04962e4
-
SHA1
80363428f99500ca7da13ad4ff5b07a97627507f
-
SHA256
82d440b0f4ab1630e2e2cfe49a04ea383657ef055b33fb86db7aaa8131e2933b
-
SHA512
0411ed00195a9bde7710718939af58a8a090d5db924e4317b499ee89dc6f1e83908045e787e36237887df738351de310b1c61da99b8df702f0033b0255935264
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Bordatino.exe.comBordatino.exe.comipconfig.exepid process 200 Bordatino.exe.com 2660 Bordatino.exe.com 3676 ipconfig.exe -
Drops startup file 1 IoCs
Processes:
Bordatino.exe.comdescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sKzQItwjjc.url Bordatino.exe.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Bordatino.exe.comdescription pid process target process PID 2660 set thread context of 3676 2660 Bordatino.exe.com ipconfig.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 3676 ipconfig.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Bordatino.exe.compid process 2660 Bordatino.exe.com -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
b719cba1a8c6e43a6f106a57b04962e4.execmd.execmd.exeBordatino.exe.comBordatino.exe.comdescription pid process target process PID 636 wrote to memory of 2160 636 b719cba1a8c6e43a6f106a57b04962e4.exe cmd.exe PID 636 wrote to memory of 2160 636 b719cba1a8c6e43a6f106a57b04962e4.exe cmd.exe PID 636 wrote to memory of 2160 636 b719cba1a8c6e43a6f106a57b04962e4.exe cmd.exe PID 2160 wrote to memory of 3156 2160 cmd.exe cmd.exe PID 2160 wrote to memory of 3156 2160 cmd.exe cmd.exe PID 2160 wrote to memory of 3156 2160 cmd.exe cmd.exe PID 3156 wrote to memory of 2676 3156 cmd.exe findstr.exe PID 3156 wrote to memory of 2676 3156 cmd.exe findstr.exe PID 3156 wrote to memory of 2676 3156 cmd.exe findstr.exe PID 3156 wrote to memory of 200 3156 cmd.exe Bordatino.exe.com PID 3156 wrote to memory of 200 3156 cmd.exe Bordatino.exe.com PID 3156 wrote to memory of 200 3156 cmd.exe Bordatino.exe.com PID 3156 wrote to memory of 820 3156 cmd.exe PING.EXE PID 3156 wrote to memory of 820 3156 cmd.exe PING.EXE PID 3156 wrote to memory of 820 3156 cmd.exe PING.EXE PID 200 wrote to memory of 2660 200 Bordatino.exe.com Bordatino.exe.com PID 200 wrote to memory of 2660 200 Bordatino.exe.com Bordatino.exe.com PID 200 wrote to memory of 2660 200 Bordatino.exe.com Bordatino.exe.com PID 2660 wrote to memory of 3676 2660 Bordatino.exe.com ipconfig.exe PID 2660 wrote to memory of 3676 2660 Bordatino.exe.com ipconfig.exe PID 2660 wrote to memory of 3676 2660 Bordatino.exe.com ipconfig.exe PID 2660 wrote to memory of 3676 2660 Bordatino.exe.com ipconfig.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b719cba1a8c6e43a6f106a57b04962e4.exe"C:\Users\Admin\AppData\Local\Temp\b719cba1a8c6e43a6f106a57b04962e4.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Pura.vssm2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^mDHHnooFzwuKWdLxXAvOmqexElRneQaCvwawdMkcQdyHAkGxAHZauWenBjehsKCCIDhUYKrkfwXoVxUaEvXxRZvAZTAtJXtuNCYXYLvQENryYTDusKJU$" Cancellata.vssm4⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.comBordatino.exe.com s4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.com s5⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exe6⤵
- Executes dropped EXE
- Gathers network information
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bordatino.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Cancellata.vssmMD5
109e6e188cb1ad77da3429a6009249aa
SHA19ed81e2b0bd55f7e438f006239f5506fb4a416c1
SHA2566f64e592ef82dc57d63af01e83674a5a24c2cc92ab18cb8f9890540dfe84fdb2
SHA512c7f6fd5e0289ba79937a31c972cefe636c45827808a39fdbf81e4323842951d303c739aaea405f784141473ff5c43f43a7d69f8aacf60ccfc8f3b2e6c4adda35
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Era.vssmMD5
cec8939061135d686ced9eba7873d51a
SHA1be692ac4a46f38394b75d3874dec18c4e542755f
SHA2565bdfc21e26db8ad198c143da236894580055144b255c00227268dafc97afc37c
SHA512f2c0f1fa78dc0448c2f234bff0154f051de2281e2180a2c65081a0b05f0d032d2b08f28fb8865ba93021d84d2fa39cd581ba1d9d5e96f8abf54ec3242dcbb935
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pura.vssmMD5
6c9fe73eff8e55c855ce458c652fb937
SHA137337f6200e7bea84a9aed760efc3b9ac3845153
SHA2563d30821ae38a2bf3cfcb096818059906e5fc6a81fbd7367715074c5740b92807
SHA51247e9432fceb61f98372166af4f621ad0679e98331e55557fd08c056894e0205c9b760d96120440108309e8abfef5128202c60ef64b7be021d6217cb4d4a27266
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ripreso.vssmMD5
2fc0e0bd6c824d35d37d5e1ed6fa1bc8
SHA10f24df48fcac1ac480fcc956e46f351b9a1d5e7e
SHA2568cbdc958498f239f156d4f42b9707e0db57ed98802485a0bb29b8e8a5c93e02c
SHA5129e8ca655e107a1f314425d2c0eeec1967c1220f8d1fb9a002f140cba9e32707caad08b658d952d732326dd636ce83bd8215603e3413230488c0e98ec622a27be
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ipconfig.exeMD5
a69ba0e84d1a6b853acf752969d3f937
SHA1ff1bee9468afc6c4ff82cba3f5ae13842ea07f0c
SHA25601cbe910e5d343c25e9066ccc7f8777a79b0d3e210aa2fb7e4428ab259712469
SHA512fd4fa4b978b746638bd847fce9dfa9bc9c0ab5c91fb989e9aeea147a4a35e2326586ec04d80bdab6b21d06b2f41e870e9f588aeca27fc3473e3fca0973e60eca
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\sMD5
2fc0e0bd6c824d35d37d5e1ed6fa1bc8
SHA10f24df48fcac1ac480fcc956e46f351b9a1d5e7e
SHA2568cbdc958498f239f156d4f42b9707e0db57ed98802485a0bb29b8e8a5c93e02c
SHA5129e8ca655e107a1f314425d2c0eeec1967c1220f8d1fb9a002f140cba9e32707caad08b658d952d732326dd636ce83bd8215603e3413230488c0e98ec622a27be
-
memory/200-120-0x0000000000000000-mapping.dmp
-
memory/820-122-0x0000000000000000-mapping.dmp
-
memory/2160-114-0x0000000000000000-mapping.dmp
-
memory/2660-124-0x0000000000000000-mapping.dmp
-
memory/2660-131-0x0000000005080000-0x0000000005082000-memory.dmpFilesize
8KB
-
memory/2660-130-0x00000000047C0000-0x00000000047C1000-memory.dmpFilesize
4KB
-
memory/2676-117-0x0000000000000000-mapping.dmp
-
memory/3156-116-0x0000000000000000-mapping.dmp
-
memory/3676-128-0x000000000044003F-mapping.dmp
-
memory/3676-132-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB