Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
23-07-2021 20:02
Static task
static1
Behavioral task
behavioral1
Sample
0f65b4fa711b40e3c89a81fa69d8690f.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
0f65b4fa711b40e3c89a81fa69d8690f.exe
Resource
win10v20210410
General
-
Target
0f65b4fa711b40e3c89a81fa69d8690f.exe
-
Size
16KB
-
MD5
0f65b4fa711b40e3c89a81fa69d8690f
-
SHA1
19240a26f205be2f8b4f4e00583a987e184f2875
-
SHA256
af18c1e923667ab287cd2699203e0bb6e6030dee131299ea670bc842dec76745
-
SHA512
82a3f01024ebf9c56c6f77d4c51003d3892e6da40a0efea34e08ddcca6786f3e3e7b6e2b18a95bf407c723a770f71e94eb90f68fb18726513a0dbac35b7e8f52
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
tmp9754tmp.exetmp9754tmp.exepid process 1504 tmp9754tmp.exe 2148 tmp9754tmp.exe -
Processes:
resource yara_rule behavioral2/memory/3172-137-0x0000000000400000-0x0000000000A16000-memory.dmp upx behavioral2/memory/3172-138-0x0000000000400000-0x0000000000A16000-memory.dmp upx -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\viTRMUuKeV.url wscript.exe -
Suspicious use of SetThreadContext 12 IoCs
Processes:
tmp9754tmp.exetmp9754tmp.exedescription pid process target process PID 1504 set thread context of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 2148 set thread context of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 3960 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 916 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 796 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 592 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 2172 2148 tmp9754tmp.exe notepad.exe PID 2148 set thread context of 2288 2148 tmp9754tmp.exe notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 11 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 796 3172 WerFault.exe notepad.exe 2672 2288 WerFault.exe notepad.exe 2968 2716 WerFault.exe notepad.exe 2300 4092 WerFault.exe notepad.exe 4008 3516 WerFault.exe notepad.exe 2220 3960 WerFault.exe notepad.exe 2244 916 WerFault.exe notepad.exe 3772 796 WerFault.exe notepad.exe 1328 592 WerFault.exe notepad.exe 1464 2172 WerFault.exe notepad.exe 2948 2288 WerFault.exe notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tmp9754tmp.exetmp9754tmp.exepid process 1504 tmp9754tmp.exe 1504 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe 2148 tmp9754tmp.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
0f65b4fa711b40e3c89a81fa69d8690f.exetmp9754tmp.exetmp9754tmp.exedescription pid process Token: SeDebugPrivilege 2388 0f65b4fa711b40e3c89a81fa69d8690f.exe Token: SeDebugPrivilege 1504 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe Token: SeDebugPrivilege 2148 tmp9754tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0f65b4fa711b40e3c89a81fa69d8690f.exetmp9754tmp.exetmp9754tmp.execmd.exedescription pid process target process PID 2388 wrote to memory of 1504 2388 0f65b4fa711b40e3c89a81fa69d8690f.exe tmp9754tmp.exe PID 2388 wrote to memory of 1504 2388 0f65b4fa711b40e3c89a81fa69d8690f.exe tmp9754tmp.exe PID 2388 wrote to memory of 1504 2388 0f65b4fa711b40e3c89a81fa69d8690f.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 1504 wrote to memory of 2148 1504 tmp9754tmp.exe tmp9754tmp.exe PID 2148 wrote to memory of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3172 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2288 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 2716 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3064 2148 tmp9754tmp.exe cmd.exe PID 2148 wrote to memory of 3064 2148 tmp9754tmp.exe cmd.exe PID 2148 wrote to memory of 3064 2148 tmp9754tmp.exe cmd.exe PID 3064 wrote to memory of 196 3064 cmd.exe wscript.exe PID 3064 wrote to memory of 196 3064 cmd.exe wscript.exe PID 3064 wrote to memory of 196 3064 cmd.exe wscript.exe PID 2148 wrote to memory of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 4092 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3516 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3960 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3960 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3960 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3960 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3960 2148 tmp9754tmp.exe notepad.exe PID 2148 wrote to memory of 3960 2148 tmp9754tmp.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f65b4fa711b40e3c89a81fa69d8690f.exe"C:\Users\Admin\AppData\Local\Temp\0f65b4fa711b40e3c89a81fa69d8690f.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp9754tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9754tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp9754tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp9754tmp.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3172 -s 1805⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2288 -s 1805⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2716 -s 1125⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.execmd.exe /C WScript "C:\ProgramData\LKBNMTFJgl\r.vbs"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exeWScript "C:\ProgramData\LKBNMTFJgl\r.vbs"5⤵
- Drops startup file
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4092 -s 1805⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3516 -s 1805⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3960 -s 1805⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 916 -s 1805⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 796 -s 1925⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 592 -s 1805⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2172 -s 1805⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\LKBNMTFJgl\cfgi"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2288 -s 1805⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\LKBNMTFJgl\r.vbsMD5
19b2d791962e01151e4b6a40a90e8cd8
SHA1a1ee500267dd1d457b3f840f8a00ba808bb46eb3
SHA25667824e30ec5d2b61ffb266e8a37e9b929e82d507d09d21961b8293c99816c664
SHA5124d39fd8f11e86490041190f1419273c702ccd85dcc603e5d7acc9d55cc60031ef1f7cc901a2c09b46d6bdc560a4c81d464c8495e7f9e8707ec7cd999f49c49fe
-
C:\Users\Admin\AppData\Local\Temp\tmp9754tmp.exeMD5
d572da9202196121d952231f26d65d07
SHA18934580e7ee3f3852e159298769bdd38bcaa12a0
SHA25615337a846c1e262136124361b3624ddd3519cf3c7f93aba1ed75728a482fc662
SHA512de311f400e980d5fc987d6a5262057823b9dc3f9e7930623fab16c9954977949b3b0901de136548db1f3a7b5d864dad2738c791d511241ce4e49e8d83f7dea5a
-
C:\Users\Admin\AppData\Local\Temp\tmp9754tmp.exeMD5
d572da9202196121d952231f26d65d07
SHA18934580e7ee3f3852e159298769bdd38bcaa12a0
SHA25615337a846c1e262136124361b3624ddd3519cf3c7f93aba1ed75728a482fc662
SHA512de311f400e980d5fc987d6a5262057823b9dc3f9e7930623fab16c9954977949b3b0901de136548db1f3a7b5d864dad2738c791d511241ce4e49e8d83f7dea5a
-
C:\Users\Admin\AppData\Local\Temp\tmp9754tmp.exeMD5
d572da9202196121d952231f26d65d07
SHA18934580e7ee3f3852e159298769bdd38bcaa12a0
SHA25615337a846c1e262136124361b3624ddd3519cf3c7f93aba1ed75728a482fc662
SHA512de311f400e980d5fc987d6a5262057823b9dc3f9e7930623fab16c9954977949b3b0901de136548db1f3a7b5d864dad2738c791d511241ce4e49e8d83f7dea5a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\viTRMUuKeV.urlMD5
e03e6937ba1878ace3d849b233adecfe
SHA1affbb4f8b53af6cf35660b775a0a8f70fb95f8b5
SHA2569846a8975f8e2dbc96cd18d5015c03b4d8226fddf69bcb99a0610c855b0a9e6d
SHA51299ea03b8635d89409c6e65dc1dd1e995eac8c02e373f3b01faa7d715f347722075cc0d5d629914399505a2ca8ffb80bfa8cafa9d99a2e702d1fcd94fb0baeca9
-
memory/196-153-0x0000000000000000-mapping.dmp
-
memory/592-183-0x0000000000A14AA0-mapping.dmp
-
memory/796-178-0x0000000000A14AA0-mapping.dmp
-
memory/916-173-0x0000000000A14AA0-mapping.dmp
-
memory/1504-124-0x00000000056A0000-0x00000000056A1000-memory.dmpFilesize
4KB
-
memory/1504-126-0x00000000056F0000-0x0000000005BEE000-memory.dmpFilesize
5.0MB
-
memory/1504-127-0x0000000008B30000-0x0000000008D39000-memory.dmpFilesize
2.0MB
-
memory/1504-132-0x00000000050E0000-0x0000000005155000-memory.dmpFilesize
468KB
-
memory/1504-117-0x0000000000000000-mapping.dmp
-
memory/1504-120-0x0000000000A40000-0x0000000000A41000-memory.dmpFilesize
4KB
-
memory/1504-125-0x00000000056F0000-0x0000000005BEE000-memory.dmpFilesize
5.0MB
-
memory/1504-122-0x0000000005BF0000-0x0000000005BF1000-memory.dmpFilesize
4KB
-
memory/1504-123-0x00000000056F0000-0x00000000056F1000-memory.dmpFilesize
4KB
-
memory/2148-133-0x0000000000400000-0x00000000005D4000-memory.dmpFilesize
1.8MB
-
memory/2148-136-0x0000000000400000-0x00000000005D4000-memory.dmpFilesize
1.8MB
-
memory/2148-134-0x0000000000404470-mapping.dmp
-
memory/2172-188-0x0000000000A14AA0-mapping.dmp
-
memory/2288-144-0x0000000000A14AA0-mapping.dmp
-
memory/2288-191-0x0000000000400000-0x0000000000400138-memory.dmpFilesize
312B
-
memory/2288-193-0x0000000000A14AA0-mapping.dmp
-
memory/2388-114-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/2388-116-0x000000001AF50000-0x000000001AF52000-memory.dmpFilesize
8KB
-
memory/2716-149-0x0000000000A14AA0-mapping.dmp
-
memory/3064-152-0x0000000000000000-mapping.dmp
-
memory/3172-139-0x0000000000A14AA0-mapping.dmp
-
memory/3172-138-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/3172-137-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/3516-163-0x0000000000A14AA0-mapping.dmp
-
memory/3960-168-0x0000000000A14AA0-mapping.dmp
-
memory/4092-158-0x0000000000A14AA0-mapping.dmp