Analysis
-
max time kernel
122s -
max time network
186s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01-02-2022 01:23
Static task
static1
Behavioral task
behavioral1
Sample
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe
Resource
win10v2004-en-20220113
General
-
Target
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe
-
Size
3.0MB
-
MD5
c8eeac24eca23bd1df10b02d5430432d
-
SHA1
39194c57c0488eca2ca7600d03783f6df4957688
-
SHA256
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234
-
SHA512
e67f30c7bdac4b57cdad769b332b586a25c8d95fd0361a90986fad1e5ee2746b4a67c6a74defadf92a2499f6b5fb7b7a26057a5148ad270e45bacd366419f94f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exepid Process 740 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exepid Process 604 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 604 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 604 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exepid Process 604 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 604 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 604 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exedescription pid Process procid_target PID 1660 wrote to memory of 740 1660 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 27 PID 1660 wrote to memory of 740 1660 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 27 PID 1660 wrote to memory of 740 1660 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 27 PID 1660 wrote to memory of 740 1660 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 27 PID 1660 wrote to memory of 604 1660 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 28 PID 1660 wrote to memory of 604 1660 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 28 PID 1660 wrote to memory of 604 1660 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 28 PID 1660 wrote to memory of 604 1660 d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe"C:\Users\Admin\AppData\Local\Temp\d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe"C:\Users\Admin\AppData\Local\Temp\d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe"C:\Users\Admin\AppData\Local\Temp\d3b606e08c524995b585d6649183387068ee1dda60dc7e11c950966a7e73f234.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f081b05ec5ea5049c4ee1407b3ccc511
SHA1baa735bbe2883900500e4035310ec74beaca0a07
SHA256e005b6187c17806af744da0d09d58f7aeaeaa233a61692163c1efdaf39e31a74
SHA512f4f024b2a18e014dec038f46dbeee6e5f72152bfb2591f320fd0e358b00603aad6841bf5a4761dd6b8f739d627c65382a109d8cfb6476c983a109f8e0ade6264
-
MD5
0e2e613769607c838a2a9fd044d67c13
SHA1fae1c03130f33fc009c00a2740b39830239eecf4
SHA25672d22b9acde26e92661cfa1364c7b9ec48d55ab6d54830cec1fdb6a89d2da8d8
SHA512b990f7a6c64d840011a89acd8af9918a685a5c4165e5a209f0ffe00193867394771e34b16d14a9bdbc18df89b603dc1ffd3bede355ef12c8adeadbf186d90141
-
MD5
347f1027d1575bec9a6556fa432c4410
SHA1c4abe557c8d7853d0ffcd3b74d8adea2d62fdd97
SHA2561243c165972fa51f670e30494b937892bccd17944f8f4c17c1042294bc77cd63
SHA5121932c84c412b685c8a660bc5541198e36dd51c5333b25c91343189fca2ffd886d1838401035a0d63541aeb21cbbdecc0c7ef292e1830fa5ae7025d87e2ca549e
-
MD5
380a0a12101b3b64d819648e5ce39256
SHA1e1b0f2b800dc48777e1c716ab46c668730176a62
SHA256b8aa9d1bd86c9e1099148a387ff72c961f948d29ca293e32374d1e3e92f96133
SHA5126adf77108973aa0bd3ad4f21aea339f61d28cf1db474d6dac60525fae7788be2a125e51b83dfd33eebbcef9f98a58a1cf02e5a01ec9cc7990083b23f382dcc9e
-
MD5
f4f88b4a210de21dbdc4ac27ad0c7f22
SHA17ccffde4e67c2d7102227e3310e8dd903c59afcb
SHA256eb2d3a1bb309f566f307dc84650343029d215139b1e9f734f929a8c48ebc66e4
SHA51250e4331d283ffb6709632e7df755ef7f4b077c7c6603d0cbc48bffc9934286531ea6cef62ab9dc94bbe5e3ea9a2dc5971ee7d19693f00054b769f37e47e421ed
-
MD5
59352c2b0c590c5fd96365d3168d723b
SHA153ab571639cc3e3a38032c1095985f7f4278d8fc
SHA256079db0d18cb8ca55e8653f3d67608c5e445d32e368feb874ed3fa1d797c7c286
SHA5122d21bcd26ef934095ca5b37aa1e66091547870f5e09c2d203dfd75923d2575f93f1a42f31e4fb7b2423b766984464ed65b048f49519837918de246a892c82828