Analysis
-
max time kernel
71s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 13:26
Static task
static1
Behavioral task
behavioral1
Sample
d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384.exe
Resource
win7-en-20211208
General
-
Target
d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384.exe
-
Size
28KB
-
MD5
2a87896e592dd168cad17b3ebcee6121
-
SHA1
af4e6d67ed5bf0434672735aa3946437bbcb1450
-
SHA256
d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384
-
SHA512
2812622744901f2fd8a9150caa8f576e18d56497a3e04c29954d5939d64cb6a297f52b1beac76be28176ec7bd5a5f787874b850ed23305f2ce6a9ed41060c307
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
server.EXEpid process 1292 server.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384.exedescription pid process target process PID 2240 wrote to memory of 1292 2240 d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384.exe server.EXE PID 2240 wrote to memory of 1292 2240 d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384.exe server.EXE PID 2240 wrote to memory of 1292 2240 d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384.exe server.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384.exe"C:\Users\Admin\AppData\Local\Temp\d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\server.EXE"C:\Users\Admin\AppData\Local\Temp\server.EXE"2⤵
- Executes dropped EXE
PID:1292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2a87896e592dd168cad17b3ebcee6121
SHA1af4e6d67ed5bf0434672735aa3946437bbcb1450
SHA256d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384
SHA5122812622744901f2fd8a9150caa8f576e18d56497a3e04c29954d5939d64cb6a297f52b1beac76be28176ec7bd5a5f787874b850ed23305f2ce6a9ed41060c307
-
MD5
2a87896e592dd168cad17b3ebcee6121
SHA1af4e6d67ed5bf0434672735aa3946437bbcb1450
SHA256d6f7c6720ba9fa9641906eee74098fc4bc825ac216d95f738a2fa51cf3c00384
SHA5122812622744901f2fd8a9150caa8f576e18d56497a3e04c29954d5939d64cb6a297f52b1beac76be28176ec7bd5a5f787874b850ed23305f2ce6a9ed41060c307