Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
02-11-2021 07:34
Static task
static1
Behavioral task
behavioral1
Sample
8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
General
-
Target
8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe
-
Size
6.0MB
-
MD5
36439a5f029df1777b51a34bd454b9d2
-
SHA1
66ab3a5c3f35fad196b07bc91930bcc171b0132f
-
SHA256
8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008
-
SHA512
e412f202184412e39e8fed102b042c68e7b65eeb6545096481db3e62e5dfdf641031736f616e1cf7e61e59705473af37a1e7c0c13762cbdc5a6aa5acaace8da9
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 988 wsqmcons.exe -
Loads dropped DLL 3 IoCs
pid Process 1232 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 988 wsqmcons.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: mountvol.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1232 wrote to memory of 620 1232 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 28 PID 1232 wrote to memory of 620 1232 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 28 PID 1232 wrote to memory of 620 1232 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 28 PID 1232 wrote to memory of 620 1232 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 28 PID 1232 wrote to memory of 620 1232 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 28 PID 1232 wrote to memory of 620 1232 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 28 PID 1232 wrote to memory of 620 1232 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe 28 PID 620 wrote to memory of 1648 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 29 PID 620 wrote to memory of 1648 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 29 PID 620 wrote to memory of 1648 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 29 PID 620 wrote to memory of 1648 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 29 PID 620 wrote to memory of 1832 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 31 PID 620 wrote to memory of 1832 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 31 PID 620 wrote to memory of 1832 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 31 PID 620 wrote to memory of 1832 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 31 PID 620 wrote to memory of 1400 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 33 PID 620 wrote to memory of 1400 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 33 PID 620 wrote to memory of 1400 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 33 PID 620 wrote to memory of 1400 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 33 PID 1648 wrote to memory of 1656 1648 cmd.exe 35 PID 1648 wrote to memory of 1656 1648 cmd.exe 35 PID 1648 wrote to memory of 1656 1648 cmd.exe 35 PID 1648 wrote to memory of 1656 1648 cmd.exe 35 PID 1400 wrote to memory of 1664 1400 cmd.exe 36 PID 1400 wrote to memory of 1664 1400 cmd.exe 36 PID 1400 wrote to memory of 1664 1400 cmd.exe 36 PID 1400 wrote to memory of 1664 1400 cmd.exe 36 PID 620 wrote to memory of 1048 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 37 PID 620 wrote to memory of 1048 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 37 PID 620 wrote to memory of 1048 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 37 PID 620 wrote to memory of 1048 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 37 PID 620 wrote to memory of 2044 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 38 PID 620 wrote to memory of 2044 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 38 PID 620 wrote to memory of 2044 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 38 PID 620 wrote to memory of 2044 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 38 PID 620 wrote to memory of 1408 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 41 PID 620 wrote to memory of 1408 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 41 PID 620 wrote to memory of 1408 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 41 PID 620 wrote to memory of 1408 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 41 PID 620 wrote to memory of 644 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 43 PID 620 wrote to memory of 644 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 43 PID 620 wrote to memory of 644 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 43 PID 620 wrote to memory of 644 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 43 PID 620 wrote to memory of 988 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 45 PID 620 wrote to memory of 988 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 45 PID 620 wrote to memory of 988 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 45 PID 620 wrote to memory of 988 620 8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe"C:\Users\Admin\AppData\Local\Temp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\is-F8OJC.tmp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp"C:\Users\Admin\AppData\Local\Temp\is-F8OJC.tmp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.tmp" /SL5="$40102,5451459,831488,C:\Users\Admin\AppData\Local\Temp\8c92dfd98d0da124299b28d92ad7b50d6b622e6078992df74a5e7b41261ad008.bin.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mountvol P: /D3⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\mountvol.exemountvol P: /D4⤵
- Enumerates connected drives
PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C bcdedit /set {bootmgr} path \EFI\Boot\bareflank.efi3⤵PID:1832
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C setx /m PATH "%PATH%C:\Users\Admin\AppData\Local\Temp\is-ID8PO.tmp"3⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\setx.exesetx /m PATH "C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\C:\Users\Admin\AppData\Local\Temp\is-ID8PO.tmp"4⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-ID8PO.tmp\devcon.exe" remove "ROOT\bareflank""3⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-ID8PO.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-ID8PO.tmp\bareflank.inf" "ROOT\bareflank""3⤵PID:2044
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-ID8PO.tmp\devcon.exe" remove "ROOT\bfbuilder""3⤵PID:1408
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-ID8PO.tmp\devcon.exe" install "C:\Users\Admin\AppData\Local\Temp\is-ID8PO.tmp\bfbuilder.inf" "ROOT\bfbuilder""3⤵PID:644
-
-
C:\Users\Admin\AppData\Roaming\wsqmcons.exe"C:\Users\Admin\AppData\Roaming\wsqmcons.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:988
-
-