Overview
overview
10Static
static
807a66d269e...aa.exe
windows7_x64
807a66d269e...aa.exe
windows10_x64
80829ef5ac4...cb.exe
windows7_x64
80829ef5ac4...cb.exe
windows10_x64
100a6621f3e6...0b.exe
windows7_x64
80a6621f3e6...0b.exe
windows10_x64
80bcadf9e23...a4.exe
windows7_x64
10bcadf9e23...a4.exe
windows10_x64
110c410851b...78.exe
windows7_x64
110c410851b...78.exe
windows10_x64
115b40c27e6...fa.exe
windows7_x64
815b40c27e6...fa.exe
windows10_x64
818d74af2b4...9f.exe
windows7_x64
1018d74af2b4...9f.exe
windows10_x64
10Bat-To-Exe...er-x64
linux_amd64
Bat-To-Exe...er-x86
linux_amd64
25ac59efdf...c7.exe
windows7_x64
1025ac59efdf...c7.exe
windows10_x64
83523671dc7...2a.exe
windows7_x64
83523671dc7...2a.exe
windows10_x64
83cb01d4470...1c.exe
windows7_x64
103cb01d4470...1c.exe
windows10_x64
104a32ef4d91...8a.exe
windows7_x64
84a32ef4d91...8a.exe
windows10_x64
8678938a9ce...25.exe
windows7_x64
1678938a9ce...25.exe
windows10_x64
16f081f8143...3b.exe
windows7_x64
106f081f8143...3b.exe
windows10_x64
10701cab0774...45.exe
windows7_x64
1701cab0774...45.exe
windows10_x64
179b2065107...61.exe
windows7_x64
879b2065107...61.exe
windows10_x64
10Analysis
-
max time kernel
140s -
max time network
132s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
24-09-2021 10:47
Static task
static1
Behavioral task
behavioral1
Sample
07a66d269e4abee565d66a243e76739404bb80cd5ed7a4694ee727b358deb5aa.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
07a66d269e4abee565d66a243e76739404bb80cd5ed7a4694ee727b358deb5aa.exe
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
0829ef5ac4288be2415215ad1ac9ef1536ff1782b4973eb63f72ebc3a040a8cb.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
0829ef5ac4288be2415215ad1ac9ef1536ff1782b4973eb63f72ebc3a040a8cb.exe
Resource
win10-en-20210920
Behavioral task
behavioral5
Sample
0a6621f3e6ec098a36a29cca7119d03e1783b25248caf3e019b77005304c0f0b.exe
Resource
win7-en-20210920
Behavioral task
behavioral6
Sample
0a6621f3e6ec098a36a29cca7119d03e1783b25248caf3e019b77005304c0f0b.exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
0bcadf9e2311c2190cd4ec93559259f81a03c02db5b29489c2b27ed86d40fca4.exe
Resource
win7-en-20210920
Behavioral task
behavioral8
Sample
0bcadf9e2311c2190cd4ec93559259f81a03c02db5b29489c2b27ed86d40fca4.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
10c410851b47490eea158797046a2be886dbf7f7da4f47a7fa4e8081af6f2f78.exe
Resource
win7-en-20210920
Behavioral task
behavioral10
Sample
10c410851b47490eea158797046a2be886dbf7f7da4f47a7fa4e8081af6f2f78.exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe
Resource
win7-en-20210920
Behavioral task
behavioral12
Sample
15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe
Resource
win10-en-20210920
Behavioral task
behavioral13
Sample
18d74af2b48fff6dd29d0b76041c4bbb4e4e53224d4ffce1a082487bf2796d9f.exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
18d74af2b48fff6dd29d0b76041c4bbb4e4e53224d4ffce1a082487bf2796d9f.exe
Resource
win10-en-20210920
Behavioral task
behavioral15
Sample
Bat-To-Exe-Converter-Downloader-master/Linux/downloader-x64
Resource
ubuntu-amd64
Behavioral task
behavioral16
Sample
Bat-To-Exe-Converter-Downloader-master/Linux/downloader-x86
Resource
ubuntu-amd64
Behavioral task
behavioral17
Sample
25ac59efdfd4db2857bd58ebb437dfe9c5d55edfbbbadaaaf27b0f631d3325c7.exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
25ac59efdfd4db2857bd58ebb437dfe9c5d55edfbbbadaaaf27b0f631d3325c7.exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
3523671dc78bc32e8caf574110eb09023588eb0a9edb91eb7f6afc7c762d332a.exe
Resource
win7-en-20210920
Behavioral task
behavioral20
Sample
3523671dc78bc32e8caf574110eb09023588eb0a9edb91eb7f6afc7c762d332a.exe
Resource
win10-en-20210920
Behavioral task
behavioral21
Sample
3cb01d4470bd82701dc1879cee898d7331ea17df13472d311b55b1ecd4546e1c.exe
Resource
win7v20210408
Behavioral task
behavioral22
Sample
3cb01d4470bd82701dc1879cee898d7331ea17df13472d311b55b1ecd4546e1c.exe
Resource
win10-en-20210920
Behavioral task
behavioral23
Sample
4a32ef4d911a823aaeac64664a8f9e28890bbd20da689580802e23d571d0f68a.exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
4a32ef4d911a823aaeac64664a8f9e28890bbd20da689580802e23d571d0f68a.exe
Resource
win10-en-20210920
Behavioral task
behavioral25
Sample
678938a9ce9ab7ee37d1c94ee7beadf4cd243c027c268cb412d3aff0b1b83b25.exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
678938a9ce9ab7ee37d1c94ee7beadf4cd243c027c268cb412d3aff0b1b83b25.exe
Resource
win10-en-20210920
Behavioral task
behavioral27
Sample
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe
Resource
win7-en-20210920
Behavioral task
behavioral28
Sample
6f081f814358d615469a82cab0569fbf3c98a3e152bcfb2a9dd348b2d881b93b.exe
Resource
win10v20210408
Behavioral task
behavioral29
Sample
701cab0774c16dfca12691ab7786e4b024c8951264998e8dbcbc9b16c34d2245.exe
Resource
win7-en-20210920
Behavioral task
behavioral30
Sample
701cab0774c16dfca12691ab7786e4b024c8951264998e8dbcbc9b16c34d2245.exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
79b2065107cb362001a2f8a8cd8e2e20678b2eb2c0372ef760495d9fff407361.exe
Resource
win7-en-20210920
Behavioral task
behavioral32
Sample
79b2065107cb362001a2f8a8cd8e2e20678b2eb2c0372ef760495d9fff407361.exe
Resource
win10v20210408
General
-
Target
15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe
-
Size
231KB
-
MD5
6f6b0600d2fca1a17cc0e61ee301a9e6
-
SHA1
99694f7203ecde238810f545388e8ab38c690e9d
-
SHA256
15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa
-
SHA512
967002cd9f11d61bdacd1c46b9fc5b8150d660160345c97bbdd7547090aa2582a0a11041632e148e0137615756f60c3a940daf95bd86a9a59da275f0ad686389
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
downloader.exepid process 1604 downloader.exe -
Loads dropped DLL 2 IoCs
Processes:
15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exepid process 1468 15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe 1468 15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exedescription pid process target process PID 1468 wrote to memory of 1604 1468 15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe downloader.exe PID 1468 wrote to memory of 1604 1468 15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe downloader.exe PID 1468 wrote to memory of 1604 1468 15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe downloader.exe PID 1468 wrote to memory of 1604 1468 15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe downloader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe"C:\Users\Admin\AppData\Local\Temp\15b40c27e6cf4c0912a9bd1208ba4f08ff11c2d3f7ece28835dd56c96f666cfa.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\data\downloader.exe"C:\Users\Admin\AppData\Local\Temp\data\downloader.exe" preferences-ips2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\data\downloader.exeMD5
e2af3bf792917ae2f91160f2b613252c
SHA19c6fd162d8a7b98533c8f97d1043ef8f8b3cdfa3
SHA256c1685018a96fe3068ebad144898a0d8e7282820f45762310ca21f69f38197b4f
SHA5123327caf66f8c9b544a4a19581ea274b1996f77e00f2f7abe6743ccac2c14aa0327c56a8d9551fedafd6656155a8c9b1a975466da6d019dcd1b1ccedc750f62e4
-
C:\Users\Admin\AppData\Local\Temp\data\preferences-ipsMD5
9c92c29702d2a721b7e597a9399608d0
SHA134001260827b6023f1703185cbf51a39182bdd59
SHA25689a9101c104bcc0b9d5875193438ebf1a16e4e41e4ab02943a7ff1a4c088ec5d
SHA5122c5e93df10f858cb576985c4c183da92dacfd071b2d9397b672ac5c2a81454dd0cafa364887e450dcc69372fb8872fdd3298051553f1f7d54a91919f0d051860
-
\Users\Admin\AppData\Local\Temp\data\downloader.exeMD5
e2af3bf792917ae2f91160f2b613252c
SHA19c6fd162d8a7b98533c8f97d1043ef8f8b3cdfa3
SHA256c1685018a96fe3068ebad144898a0d8e7282820f45762310ca21f69f38197b4f
SHA5123327caf66f8c9b544a4a19581ea274b1996f77e00f2f7abe6743ccac2c14aa0327c56a8d9551fedafd6656155a8c9b1a975466da6d019dcd1b1ccedc750f62e4
-
\Users\Admin\AppData\Local\Temp\data\downloader.exeMD5
e2af3bf792917ae2f91160f2b613252c
SHA19c6fd162d8a7b98533c8f97d1043ef8f8b3cdfa3
SHA256c1685018a96fe3068ebad144898a0d8e7282820f45762310ca21f69f38197b4f
SHA5123327caf66f8c9b544a4a19581ea274b1996f77e00f2f7abe6743ccac2c14aa0327c56a8d9551fedafd6656155a8c9b1a975466da6d019dcd1b1ccedc750f62e4
-
memory/1468-54-0x00000000755A1000-0x00000000755A3000-memory.dmpFilesize
8KB
-
memory/1604-57-0x0000000000000000-mapping.dmp