Analysis
-
max time kernel
19s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-09-2021 12:32
Static task
static1
Behavioral task
behavioral1
Sample
500A3B64014DE00B03F981299586FAE6.exe
Resource
win7-en
gluptebametasploitraccoonredlinevidarvkeylogger706937b8ef25fa9e346b7a31e4b6ff160623dd5fed2474pab777aspackv2backdoordiscoverydropperevasioninfostealerkeyloggerloaderpersistencespywarestealertrojan
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
500A3B64014DE00B03F981299586FAE6.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
500A3B64014DE00B03F981299586FAE6.exe
-
Size
5.5MB
-
MD5
500a3b64014de00b03f981299586fae6
-
SHA1
268186377c6306055e8c42c1a1bde48adcb735b2
-
SHA256
96b3a6f88bebb213230bd38f95804466296c238e0774861ceec6ad4424dcfb45
-
SHA512
fb0f4b59aa74754056252edf1ddc0b4d6fc8a983aa1ff638030bec8b129141915b407b812a4a26c01e65b5b0ed259daab7bcadbb8d9f4c9a53c4d61295629085
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000100000001ab28-118.dat aspack_v212_v242 behavioral2/files/0x000100000001ab28-120.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4052 setup_install.exe -
Loads dropped DLL 4 IoCs
pid Process 4052 setup_install.exe 4052 setup_install.exe 4052 setup_install.exe 4052 setup_install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1832 wrote to memory of 4052 1832 500A3B64014DE00B03F981299586FAE6.exe 75 PID 1832 wrote to memory of 4052 1832 500A3B64014DE00B03F981299586FAE6.exe 75 PID 1832 wrote to memory of 4052 1832 500A3B64014DE00B03F981299586FAE6.exe 75 PID 4052 wrote to memory of 3600 4052 setup_install.exe 78 PID 4052 wrote to memory of 3600 4052 setup_install.exe 78 PID 4052 wrote to memory of 3600 4052 setup_install.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\500A3B64014DE00B03F981299586FAE6.exe"C:\Users\Admin\AppData\Local\Temp\500A3B64014DE00B03F981299586FAE6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\7zS827F9844\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS827F9844\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\58a51f2acaa24098.exe3⤵PID:3600
-
-