Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
23-11-2021 09:05
Static task
static1
Behavioral task
behavioral1
Sample
c7387f1ae36b2649856c5077edb63e70.exe
Resource
win7-en-20211014
General
-
Target
c7387f1ae36b2649856c5077edb63e70.exe
-
Size
374KB
-
MD5
c7387f1ae36b2649856c5077edb63e70
-
SHA1
27163fe328de1b1fdbc3018c447f68ebb0dc9776
-
SHA256
c3315d1c3860a9a019c4693680a9d4522a81f3cc804aef5fbb760048401a44af
-
SHA512
138507b8e112c150ddcd576e9e0b979304cda1e832dc565162f6b95ebcf76dfe13af8d55a9896f4b562e29732788871e77f6355f653acbc3ef56749bed98016d
Malware Config
Extracted
cryptbot
daqsml22.top
morkjm02.top
-
payload_url
http://mywmis14.top/download.php?file=kumasi.exe
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1164 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
c7387f1ae36b2649856c5077edb63e70.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c7387f1ae36b2649856c5077edb63e70.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c7387f1ae36b2649856c5077edb63e70.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 528 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c7387f1ae36b2649856c5077edb63e70.execmd.exedescription pid process target process PID 560 wrote to memory of 1164 560 c7387f1ae36b2649856c5077edb63e70.exe cmd.exe PID 560 wrote to memory of 1164 560 c7387f1ae36b2649856c5077edb63e70.exe cmd.exe PID 560 wrote to memory of 1164 560 c7387f1ae36b2649856c5077edb63e70.exe cmd.exe PID 560 wrote to memory of 1164 560 c7387f1ae36b2649856c5077edb63e70.exe cmd.exe PID 1164 wrote to memory of 528 1164 cmd.exe timeout.exe PID 1164 wrote to memory of 528 1164 cmd.exe timeout.exe PID 1164 wrote to memory of 528 1164 cmd.exe timeout.exe PID 1164 wrote to memory of 528 1164 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7387f1ae36b2649856c5077edb63e70.exe"C:\Users\Admin\AppData\Local\Temp\c7387f1ae36b2649856c5077edb63e70.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\YvTghLyLKXTq & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\c7387f1ae36b2649856c5077edb63e70.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:528
-
-