Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
01-12-2021 13:14
Static task
static1
Behavioral task
behavioral1
Sample
tmp/6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe
Resource
win7-en-20211014
General
-
Target
tmp/6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe
-
Size
463KB
-
MD5
63ead0514c5352dc4a7af34b8205366f
-
SHA1
b28b346574521b65b67b59838dfc22b70bfd533e
-
SHA256
6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550
-
SHA512
aa23453ea399961760f2469688da8be1f6525b7ef9f8f19b655e6f97925795ce103e307282e60a587eb8886c90fc9c9f303ce266b3313fc11497cbc92b2b7e62
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
WScript.exepid process 2112 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\Local Settings 6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exepid process 2968 6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exedescription pid process target process PID 2968 wrote to memory of 2112 2968 6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe WScript.exe PID 2968 wrote to memory of 2112 2968 6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe WScript.exe PID 2968 wrote to memory of 2112 2968 6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp\6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe"C:\Users\Admin\AppData\Local\Temp\tmp\6862cf51b5546665e90e27a0a188ea8c468097f86b8b5d68fa0521f4cd3a9550.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pvhmwittnfgudtxlycgu.vbs"2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\pvhmwittnfgudtxlycgu.vbsMD5
d086e89742c815ec9ade756bb8a9bade
SHA1fca5af7cf420db4f029c9c69a6f8902b21c8233b
SHA256956966190f2f73b05818d1c346cb21e860e209c7c71a2786ee51d3f442bb13c4
SHA512a3bad018dcbcd73a5f70f47acdb9c2ccb2281ef0926c8479bfbc2c7e0ee72846b5d085f577642c710ded846d3b3850febcbeb048beb6aa9a3dad277707894cad
-
memory/2112-118-0x0000000000000000-mapping.dmp