Analysis
-
max time kernel
19s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-09-2021 12:32
Static task
static1
Behavioral task
behavioral1
Sample
500A3B64014DE00B03F981299586FAE6.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
500A3B64014DE00B03F981299586FAE6.exe
Resource
win10v20210408
General
-
Target
500A3B64014DE00B03F981299586FAE6.exe
-
Size
5.5MB
-
MD5
500a3b64014de00b03f981299586fae6
-
SHA1
268186377c6306055e8c42c1a1bde48adcb735b2
-
SHA256
96b3a6f88bebb213230bd38f95804466296c238e0774861ceec6ad4424dcfb45
-
SHA512
fb0f4b59aa74754056252edf1ddc0b4d6fc8a983aa1ff638030bec8b129141915b407b812a4a26c01e65b5b0ed259daab7bcadbb8d9f4c9a53c4d61295629085
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS827F9844\libzip.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zS827F9844\libzip.dll aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
setup_install.exepid process 4052 setup_install.exe -
Loads dropped DLL 4 IoCs
Processes:
setup_install.exepid process 4052 setup_install.exe 4052 setup_install.exe 4052 setup_install.exe 4052 setup_install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
500A3B64014DE00B03F981299586FAE6.exesetup_install.exedescription pid process target process PID 1832 wrote to memory of 4052 1832 500A3B64014DE00B03F981299586FAE6.exe setup_install.exe PID 1832 wrote to memory of 4052 1832 500A3B64014DE00B03F981299586FAE6.exe setup_install.exe PID 1832 wrote to memory of 4052 1832 500A3B64014DE00B03F981299586FAE6.exe setup_install.exe PID 4052 wrote to memory of 3600 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 3600 4052 setup_install.exe cmd.exe PID 4052 wrote to memory of 3600 4052 setup_install.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\500A3B64014DE00B03F981299586FAE6.exe"C:\Users\Admin\AppData\Local\Temp\500A3B64014DE00B03F981299586FAE6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\7zS827F9844\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS827F9844\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\58a51f2acaa24098.exe3⤵PID:3600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
81d6f0a42171755753e3bc9b48f43c30
SHA1b766d96e38e151a6a51d72e753fb92687e8f9d03
SHA256e186cf97d768a139819278c4ce35e6df65adb2bdaee450409994d4c7c8d7c723
SHA512461bf23b1ec98d97281fd55308d1384a3f471d0a4b2e68c2a81a98346db9edc3ca2b8dbeb68ae543796f73cc04900ec298554b7ff837db0241863a157b43cda1
-
MD5
20f57609bfc87d6b10b16d9f1fe51242
SHA1945b524c90f6b29f8af13b04e9dd7c0fc60475ce
SHA256935b5fd6aed002e376ab525b64563116da0957c068c9ca70798ec6f0e32111e5
SHA512ccc573376cc7fb91099f9d5215b0e9553741174a862e3a8afaaac0f41542f58d6ee561d195d5ef5866934cdecfb3ccedc974dd84f1da4637c470ebd60c132566
-
MD5
20f57609bfc87d6b10b16d9f1fe51242
SHA1945b524c90f6b29f8af13b04e9dd7c0fc60475ce
SHA256935b5fd6aed002e376ab525b64563116da0957c068c9ca70798ec6f0e32111e5
SHA512ccc573376cc7fb91099f9d5215b0e9553741174a862e3a8afaaac0f41542f58d6ee561d195d5ef5866934cdecfb3ccedc974dd84f1da4637c470ebd60c132566
-
MD5
c7d4d685a0af2a09cbc21cb474358595
SHA1b784599c82bb90d5267fd70aaa42acc0c614b5d2
SHA256e96b397b499d9eaa3f52eaf496ca8941e80c0ad1544879ccadf02bf2c6a1ecfc
SHA512fed2c126a499fae6215e0ef7d76aeec45b60417ed11c7732379d1e92c87e27355fe8753efed86af4f58d52ea695494ef674538192fac1e8a2a114467061a108b
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
81d6f0a42171755753e3bc9b48f43c30
SHA1b766d96e38e151a6a51d72e753fb92687e8f9d03
SHA256e186cf97d768a139819278c4ce35e6df65adb2bdaee450409994d4c7c8d7c723
SHA512461bf23b1ec98d97281fd55308d1384a3f471d0a4b2e68c2a81a98346db9edc3ca2b8dbeb68ae543796f73cc04900ec298554b7ff837db0241863a157b43cda1
-
MD5
c7d4d685a0af2a09cbc21cb474358595
SHA1b784599c82bb90d5267fd70aaa42acc0c614b5d2
SHA256e96b397b499d9eaa3f52eaf496ca8941e80c0ad1544879ccadf02bf2c6a1ecfc
SHA512fed2c126a499fae6215e0ef7d76aeec45b60417ed11c7732379d1e92c87e27355fe8753efed86af4f58d52ea695494ef674538192fac1e8a2a114467061a108b