Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
18-12-2021 10:37
Static task
static1
Behavioral task
behavioral1
Sample
6f6df17ecbcbdce8c857e85a368801a9.exe
Resource
win7-en-20211208
General
-
Target
6f6df17ecbcbdce8c857e85a368801a9.exe
-
Size
383KB
-
MD5
6f6df17ecbcbdce8c857e85a368801a9
-
SHA1
03491534e6c3fc9627899be5f9d7b053da57dfab
-
SHA256
23ae7c16bd46eb8cb7a8c34e6d903c0bb613628245a9471db6f31fd27b12e06d
-
SHA512
57efc2bbaf4ff80022bd7bae17371ff894c6f73482e9c7d2f6c25b548a922f225396bce441348c06a8723e9922cb99e1628e7c5b98de22f8e50446af548403de
Malware Config
Extracted
cryptbot
sezdne62.top
morgwa06.top
-
payload_url
http://ekuwac17.top/download.php?file=boulle.exe
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1096 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
6f6df17ecbcbdce8c857e85a368801a9.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6f6df17ecbcbdce8c857e85a368801a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6f6df17ecbcbdce8c857e85a368801a9.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 584 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6f6df17ecbcbdce8c857e85a368801a9.execmd.exedescription pid process target process PID 1796 wrote to memory of 1096 1796 6f6df17ecbcbdce8c857e85a368801a9.exe cmd.exe PID 1796 wrote to memory of 1096 1796 6f6df17ecbcbdce8c857e85a368801a9.exe cmd.exe PID 1796 wrote to memory of 1096 1796 6f6df17ecbcbdce8c857e85a368801a9.exe cmd.exe PID 1796 wrote to memory of 1096 1796 6f6df17ecbcbdce8c857e85a368801a9.exe cmd.exe PID 1096 wrote to memory of 584 1096 cmd.exe timeout.exe PID 1096 wrote to memory of 584 1096 cmd.exe timeout.exe PID 1096 wrote to memory of 584 1096 cmd.exe timeout.exe PID 1096 wrote to memory of 584 1096 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f6df17ecbcbdce8c857e85a368801a9.exe"C:\Users\Admin\AppData\Local\Temp\6f6df17ecbcbdce8c857e85a368801a9.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\ErbOqyJKV & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\6f6df17ecbcbdce8c857e85a368801a9.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:584
-
-