Overview
overview
10Static
static
107zS850A099...ed.exe
windows7_x64
107zS850A099...ed.exe
windows10-2004_x64
107zS850A099...1a.exe
windows7_x64
107zS850A099...1a.exe
windows10-2004_x64
17zS850A099...b7.exe
windows7_x64
107zS850A099...b7.exe
windows10-2004_x64
107zS850A099...5e.exe
windows7_x64
107zS850A099...5e.exe
windows10-2004_x64
107zS850A099...a0.exe
windows7_x64
107zS850A099...a0.exe
windows10-2004_x64
107zS850A099...95.exe
windows7_x64
77zS850A099...95.exe
windows10-2004_x64
77zS850A099...cb.exe
windows7_x64
107zS850A099...cb.exe
windows10-2004_x64
17zS850A099...58.exe
windows7_x64
77zS850A099...58.exe
windows10-2004_x64
17zS850A099...7f.exe
windows7_x64
77zS850A099...7f.exe
windows10-2004_x64
17zS850A099...32.exe
windows7_x64
77zS850A099...32.exe
windows10-2004_x64
77zS850A099...c3.exe
windows7_x64
87zS850A099...c3.exe
windows10-2004_x64
87zS850A099...e9.exe
windows7_x64
67zS850A099...e9.exe
windows10-2004_x64
67zS850A099...8c.exe
windows7_x64
87zS850A099...8c.exe
windows10-2004_x64
17zS850A099...8c.exe
windows7_x64
107zS850A099...8c.exe
windows10-2004_x64
107zS850A099...ll.exe
windows7_x64
107zS850A099...ll.exe
windows10-2004_x64
1Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-01-2022 08:10
Behavioral task
behavioral1
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7zS850A099E/61e74fd2175cb_Tue23956aa60ed.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
7zS850A099E/61e74fd41f841_Tue2365aa82b7.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral7
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
7zS850A099E/61e74fd53f766_Tue23ec97445e.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral9
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win7-en-20211208
Behavioral task
behavioral10
Sample
7zS850A099E/61e74fd78769f_Tue234b6c24d9a0.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral11
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win7-en-20211208
Behavioral task
behavioral12
Sample
7zS850A099E/61e74fd8ef830_Tue23593425095.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win7-en-20211208
Behavioral task
behavioral14
Sample
7zS850A099E/61e74fda51500_Tue23260baecb.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win7-en-20211208
Behavioral task
behavioral16
Sample
7zS850A099E/61e7501ab629f_Tue23c4645058.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win7-en-20211208
Behavioral task
behavioral18
Sample
7zS850A099E/61e7501b7eabe_Tue2344597f.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win7-en-20211208
Behavioral task
behavioral20
Sample
7zS850A099E/61e7501c830d6_Tue23bdf4712a32.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral21
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win7-en-20211208
Behavioral task
behavioral22
Sample
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral23
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win7-en-20211208
Behavioral task
behavioral24
Sample
7zS850A099E/61e7502b8389b_Tue233252e9.exe
Resource
win10v2004-en-20220112
Behavioral task
behavioral25
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win7-en-20211208
Behavioral task
behavioral26
Sample
7zS850A099E/61e7502c4cff3_Tue232cba58c.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral27
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win7-en-20211208
Behavioral task
behavioral28
Sample
7zS850A099E/61e7502f007f3_Tue23d6fecf8c.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
7zS850A099E/setup_install.exe
Resource
win7-en-20211208
Behavioral task
behavioral30
Sample
7zS850A099E/setup_install.exe
Resource
win10v2004-en-20220113
General
-
Target
7zS850A099E/61e74fd3252fe_Tue23df2ad021a.exe
-
Size
381KB
-
MD5
996061fe21353bf63874579cc6c090cc
-
SHA1
eeaf5d66e0ff5e9ddad02653c5bf6af5275e47e9
-
SHA256
b9dad89b3de1d7f9a4b73a5d107c74f716a6e2e89d653c48ab47108b37ad699a
-
SHA512
042ea077acfc0dff8684a5eb304af15177c4e6f54c774471b8091669b1ab16833894ca7a52917f8a6bbeacbb6532db521cea61d70ac4c5c992cb4896083d6c93
Malware Config
Signatures
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.tmp61e74fd3252fe_Tue23df2ad021a.tmpdllhostwin.exepid process 1968 61e74fd3252fe_Tue23df2ad021a.tmp 608 61e74fd3252fe_Tue23df2ad021a.tmp 1916 dllhostwin.exe -
Loads dropped DLL 10 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.exe61e74fd3252fe_Tue23df2ad021a.tmp61e74fd3252fe_Tue23df2ad021a.exe61e74fd3252fe_Tue23df2ad021a.tmppid process 944 61e74fd3252fe_Tue23df2ad021a.exe 1968 61e74fd3252fe_Tue23df2ad021a.tmp 1968 61e74fd3252fe_Tue23df2ad021a.tmp 1968 61e74fd3252fe_Tue23df2ad021a.tmp 580 61e74fd3252fe_Tue23df2ad021a.exe 608 61e74fd3252fe_Tue23df2ad021a.tmp 608 61e74fd3252fe_Tue23df2ad021a.tmp 608 61e74fd3252fe_Tue23df2ad021a.tmp 608 61e74fd3252fe_Tue23df2ad021a.tmp 608 61e74fd3252fe_Tue23df2ad021a.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.tmpdescription ioc process File created C:\Program Files (x86)\AtomTweaker\unins000.dat 61e74fd3252fe_Tue23df2ad021a.tmp File created C:\Program Files (x86)\AtomTweaker\is-9FP2V.tmp 61e74fd3252fe_Tue23df2ad021a.tmp File opened for modification C:\Program Files (x86)\AtomTweaker\unins000.dat 61e74fd3252fe_Tue23df2ad021a.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.tmppid process 608 61e74fd3252fe_Tue23df2ad021a.tmp 608 61e74fd3252fe_Tue23df2ad021a.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dllhostwin.exepid process 1916 dllhostwin.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.tmppid process 608 61e74fd3252fe_Tue23df2ad021a.tmp -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
61e74fd3252fe_Tue23df2ad021a.exe61e74fd3252fe_Tue23df2ad021a.tmp61e74fd3252fe_Tue23df2ad021a.exe61e74fd3252fe_Tue23df2ad021a.tmpdescription pid process target process PID 944 wrote to memory of 1968 944 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 944 wrote to memory of 1968 944 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 944 wrote to memory of 1968 944 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 944 wrote to memory of 1968 944 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 944 wrote to memory of 1968 944 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 944 wrote to memory of 1968 944 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 944 wrote to memory of 1968 944 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 1968 wrote to memory of 580 1968 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 1968 wrote to memory of 580 1968 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 1968 wrote to memory of 580 1968 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 1968 wrote to memory of 580 1968 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 1968 wrote to memory of 580 1968 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 1968 wrote to memory of 580 1968 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 1968 wrote to memory of 580 1968 61e74fd3252fe_Tue23df2ad021a.tmp 61e74fd3252fe_Tue23df2ad021a.exe PID 580 wrote to memory of 608 580 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 580 wrote to memory of 608 580 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 580 wrote to memory of 608 580 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 580 wrote to memory of 608 580 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 580 wrote to memory of 608 580 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 580 wrote to memory of 608 580 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 580 wrote to memory of 608 580 61e74fd3252fe_Tue23df2ad021a.exe 61e74fd3252fe_Tue23df2ad021a.tmp PID 608 wrote to memory of 1916 608 61e74fd3252fe_Tue23df2ad021a.tmp dllhostwin.exe PID 608 wrote to memory of 1916 608 61e74fd3252fe_Tue23df2ad021a.tmp dllhostwin.exe PID 608 wrote to memory of 1916 608 61e74fd3252fe_Tue23df2ad021a.tmp dllhostwin.exe PID 608 wrote to memory of 1916 608 61e74fd3252fe_Tue23df2ad021a.tmp dllhostwin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\is-045HI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp"C:\Users\Admin\AppData\Local\Temp\is-045HI.tmp\61e74fd3252fe_Tue23df2ad021a.tmp" /SL5="$80152,140765,56832,C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe" /SILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\is-9J2TK.tmp\61e74fd3252fe_Tue23df2ad021a.tmp"C:\Users\Admin\AppData\Local\Temp\is-9J2TK.tmp\61e74fd3252fe_Tue23df2ad021a.tmp" /SL5="$5011C,140765,56832,C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e74fd3252fe_Tue23df2ad021a.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\is-3OFC7.tmp\dllhostwin.exe"C:\Users\Admin\AppData\Local\Temp\is-3OFC7.tmp\dllhostwin.exe" 775⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
b3bb91ad96f2d4c041861ce59ba6ac73
SHA1e18c6fd6a0d0d5c124c9ef6972a76c47c28c80a3
SHA2560581160998be30f79bd9a0925a01b0ebc4cb94265dfa7f8da1e2839bf0f1e426
SHA512e3a8426d202a8aad79aad5d75549753cf70b9c2c0fa4c9468f03d089eca8e529b56cd8fa16b7be3a4cfc019d43ff458b9dc8a1cae44b6ed75e27f21489a2cbdd
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
MD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
MD5
b3bb91ad96f2d4c041861ce59ba6ac73
SHA1e18c6fd6a0d0d5c124c9ef6972a76c47c28c80a3
SHA2560581160998be30f79bd9a0925a01b0ebc4cb94265dfa7f8da1e2839bf0f1e426
SHA512e3a8426d202a8aad79aad5d75549753cf70b9c2c0fa4c9468f03d089eca8e529b56cd8fa16b7be3a4cfc019d43ff458b9dc8a1cae44b6ed75e27f21489a2cbdd
-
MD5
b3bb91ad96f2d4c041861ce59ba6ac73
SHA1e18c6fd6a0d0d5c124c9ef6972a76c47c28c80a3
SHA2560581160998be30f79bd9a0925a01b0ebc4cb94265dfa7f8da1e2839bf0f1e426
SHA512e3a8426d202a8aad79aad5d75549753cf70b9c2c0fa4c9468f03d089eca8e529b56cd8fa16b7be3a4cfc019d43ff458b9dc8a1cae44b6ed75e27f21489a2cbdd
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
MD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc