Analysis
-
max time kernel
72s -
max time network
21s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-02-2022 13:09
Static task
static1
Behavioral task
behavioral1
Sample
8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe
Resource
win10v2004-en-20220112
General
-
Target
8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe
-
Size
108KB
-
MD5
300b7aff514d9d72891455bbe545718c
-
SHA1
15a54c02c8787b9a7057a5542194dd1b4ad82644
-
SHA256
8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782
-
SHA512
ba451e21e2b26e101e87414252024acb8baa5e8f40c03e747636f0c0652a5df3d5aa86dff490d43149809af09d1d42286f1ac554e7bd35209827c2ec4fda2f2d
Malware Config
Signatures
-
Ostap JavaScript Downloader 1 IoCs
Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot
resource yara_rule behavioral1/files/0x0009000000012205-57.dat family_ostap -
ostap
Ostap is a JS downloader, used to deliver other families.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2028 2040 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe 27 PID 2040 wrote to memory of 2028 2040 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe 27 PID 2040 wrote to memory of 2028 2040 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe 27 PID 2040 wrote to memory of 2028 2040 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe 27 PID 2040 wrote to memory of 2028 2040 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe 27 PID 2040 wrote to memory of 2028 2040 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe 27 PID 2040 wrote to memory of 2028 2040 8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe 27 PID 2028 wrote to memory of 604 2028 cmd.exe 29 PID 2028 wrote to memory of 604 2028 cmd.exe 29 PID 2028 wrote to memory of 604 2028 cmd.exe 29 PID 2028 wrote to memory of 604 2028 cmd.exe 29 PID 2028 wrote to memory of 604 2028 cmd.exe 29 PID 2028 wrote to memory of 604 2028 cmd.exe 29 PID 2028 wrote to memory of 604 2028 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe"C:\Users\Admin\AppData\Local\Temp\8b51c81b1120f90f7a834757e8f471326f7c5468fd3404c24ecd047d16036782.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c vol && 900.jse && type 700.txt && date2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\900.jse"3⤵PID:604
-
-