Analysis
-
max time kernel
272s -
max time network
274s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-07-2021 09:31
Static task
static1
Behavioral task
behavioral1
Sample
ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe
Resource
win10v20210410
General
-
Target
ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe
-
Size
747KB
-
MD5
e74cf8c11ef1ebe473276c71b52b31ef
-
SHA1
8af325b046994a64adf4e16329255fb31e7f1821
-
SHA256
e59b0eb4edd5ddce6a7ae424d02824304f69db0444b8eb520f0cd7a3bbba4a4b
-
SHA512
4b0ab9e5c663b3a841899d5fd80e6c9d70fdfe50374ea9c60ee511f8d6f86c2314f68cb5439abbc8b9ec48233d026091ca4e14de510ef8e18892ae48b5add75d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 4 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEpid process 2400 PING.EXE 1916 PING.EXE 2108 PING.EXE 4028 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 3920 powershell.exe 3920 powershell.exe 3920 powershell.exe 2052 powershell.exe 2052 powershell.exe 2052 powershell.exe 3700 powershell.exe 3700 powershell.exe 3700 powershell.exe 2072 powershell.exe 2072 powershell.exe 2072 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exedescription pid process Token: SeDebugPrivilege 3920 powershell.exe Token: SeDebugPrivilege 2052 powershell.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process target process PID 3908 wrote to memory of 3920 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3908 wrote to memory of 3920 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3908 wrote to memory of 3920 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3920 wrote to memory of 2400 3920 powershell.exe PING.EXE PID 3920 wrote to memory of 2400 3920 powershell.exe PING.EXE PID 3920 wrote to memory of 2400 3920 powershell.exe PING.EXE PID 3908 wrote to memory of 2052 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3908 wrote to memory of 2052 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3908 wrote to memory of 2052 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 2052 wrote to memory of 1916 2052 powershell.exe PING.EXE PID 2052 wrote to memory of 1916 2052 powershell.exe PING.EXE PID 2052 wrote to memory of 1916 2052 powershell.exe PING.EXE PID 3908 wrote to memory of 3700 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3908 wrote to memory of 3700 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3908 wrote to memory of 3700 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3700 wrote to memory of 2108 3700 powershell.exe PING.EXE PID 3700 wrote to memory of 2108 3700 powershell.exe PING.EXE PID 3700 wrote to memory of 2108 3700 powershell.exe PING.EXE PID 3908 wrote to memory of 2072 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3908 wrote to memory of 2072 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 3908 wrote to memory of 2072 3908 ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe powershell.exe PID 2072 wrote to memory of 4028 2072 powershell.exe PING.EXE PID 2072 wrote to memory of 4028 2072 powershell.exe PING.EXE PID 2072 wrote to memory of 4028 2072 powershell.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe"C:\Users\Admin\AppData\Local\Temp\ORDER_2021KL-119_Arve_Nr_2021001637_COTTON_TRADERS_LTD_PO_AUGUST.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
0f5cbdca905beb13bebdcf43fb0716bd
SHA19e136131389fde83297267faf6c651d420671b3f
SHA256a99135d86804f5cf8aaeb5943c1929bd1458652a3318ab8c01aee22bb4991060
SHA512a41d2939473cffcb6beb8b58b499441d16da8bcc22972d53b8b699b82a7dc7be0db39bcd2486edd136294eb3f1c97ddd27b2a9ff45b831579cba6896d1f776b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
21694d79a4d52eb804ec2a0d8bb89f33
SHA1b19bff691add4c56510a8ce6ad3fa95280f82fce
SHA256a697721d224aff81059201ff9b3ce75f87b4575e1322979655cdf206497b7329
SHA512f4b8d44d1d620eb678a0dc5fb7c2aa1a64e8672e253e84d1a19eaada44d124568da743738f75872f7bf37938cbdb71ca52a27aa43ffe714f9bfe591e63568b56
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
c578aa0500ac350f09a8ee65ba28780b
SHA13720ee76bbbbd2e7bd73aece149486766f7d7989
SHA256a198bbf206d541735da7d3ae9fd0d197601c97784f99e1fb25460294c0b3ed61
SHA512c5ee5579f48872dba2610e71554902b54d2ea09e034baa2496123676cfec2666522272b639de801be9d480e8c677ba361440718a9ba07b776ea723534b6801a3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
3ed13c338614b01efd945078fb2b5cb2
SHA1b1348571362849210cc5011cf5ee42ce65523233
SHA256a028ff8c65e8e644f032c4921b12e21a42c0552c1be44f97d6977185bfc6d203
SHA5126d9e61b660ab571bd0b730d80710276b3481d99f167cc29e6979a5b32c62bc27d8d52c5f0c8240b71a1d48d0d5f0ede89b60a31ccdec7fbc07f48e418db850a8
-
memory/1916-155-0x0000000000000000-mapping.dmp
-
memory/2052-158-0x0000000001104000-0x0000000001106000-memory.dmpFilesize
8KB
-
memory/2052-157-0x0000000001103000-0x0000000001104000-memory.dmpFilesize
4KB
-
memory/2052-150-0x0000000001102000-0x0000000001103000-memory.dmpFilesize
4KB
-
memory/2052-149-0x0000000001100000-0x0000000001101000-memory.dmpFilesize
4KB
-
memory/2052-136-0x0000000000000000-mapping.dmp
-
memory/2072-201-0x00000000012A3000-0x00000000012A4000-memory.dmpFilesize
4KB
-
memory/2072-188-0x00000000012A0000-0x00000000012A1000-memory.dmpFilesize
4KB
-
memory/2072-189-0x00000000012A2000-0x00000000012A3000-memory.dmpFilesize
4KB
-
memory/2072-178-0x0000000000000000-mapping.dmp
-
memory/2072-202-0x00000000012A4000-0x00000000012A6000-memory.dmpFilesize
8KB
-
memory/2108-174-0x0000000000000000-mapping.dmp
-
memory/2400-135-0x0000000000000000-mapping.dmp
-
memory/3700-176-0x0000000004B63000-0x0000000004B64000-memory.dmpFilesize
4KB
-
memory/3700-177-0x0000000004B64000-0x0000000004B66000-memory.dmpFilesize
8KB
-
memory/3700-168-0x0000000004B60000-0x0000000004B61000-memory.dmpFilesize
4KB
-
memory/3700-169-0x0000000004B62000-0x0000000004B63000-memory.dmpFilesize
4KB
-
memory/3700-159-0x0000000000000000-mapping.dmp
-
memory/3908-194-0x0000000006520000-0x000000000657F000-memory.dmpFilesize
380KB
-
memory/3908-199-0x0000000008B90000-0x0000000008C0C000-memory.dmpFilesize
496KB
-
memory/3908-114-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/3908-120-0x00000000049B0000-0x0000000004EAE000-memory.dmpFilesize
5.0MB
-
memory/3908-119-0x00000000049B0000-0x0000000004EAE000-memory.dmpFilesize
5.0MB
-
memory/3908-118-0x0000000004BD0000-0x0000000004BD1000-memory.dmpFilesize
4KB
-
memory/3908-117-0x0000000004A70000-0x0000000004A71000-memory.dmpFilesize
4KB
-
memory/3908-116-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/3920-128-0x0000000007630000-0x0000000007631000-memory.dmpFilesize
4KB
-
memory/3920-130-0x0000000007FB0000-0x0000000007FB1000-memory.dmpFilesize
4KB
-
memory/3920-148-0x0000000004C04000-0x0000000004C06000-memory.dmpFilesize
8KB
-
memory/3920-134-0x0000000008760000-0x0000000008761000-memory.dmpFilesize
4KB
-
memory/3920-133-0x00000000088F0000-0x00000000088F1000-memory.dmpFilesize
4KB
-
memory/3920-132-0x0000000007F90000-0x0000000007F91000-memory.dmpFilesize
4KB
-
memory/3920-131-0x0000000008020000-0x0000000008021000-memory.dmpFilesize
4KB
-
memory/3920-147-0x0000000004C03000-0x0000000004C04000-memory.dmpFilesize
4KB
-
memory/3920-129-0x0000000007D60000-0x0000000007D61000-memory.dmpFilesize
4KB
-
memory/3920-127-0x0000000004C02000-0x0000000004C03000-memory.dmpFilesize
4KB
-
memory/3920-121-0x0000000000000000-mapping.dmp
-
memory/3920-126-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/3920-125-0x00000000076C0000-0x00000000076C1000-memory.dmpFilesize
4KB
-
memory/3920-124-0x0000000004C10000-0x0000000004C11000-memory.dmpFilesize
4KB
-
memory/4028-193-0x0000000000000000-mapping.dmp