Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 21:45
Static task
static1
Behavioral task
behavioral1
Sample
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
Resource
win7-en-20211208
General
-
Target
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
-
Size
619KB
-
MD5
a4a24a3daed6b4673884187b131c968b
-
SHA1
b20661090b7305239d75209bac8d2179f648dcaa
-
SHA256
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df
-
SHA512
3f49b3876921b41483b907066c9f1f6a61d3fe759219c2db8cb048473b94ba52ab064fcc7c4615da2e1b8056dedc93bf22ed865ff4df442e5ba5c43b1c6082dc
Malware Config
Extracted
gootkit
260319
sillikogermin.com
feferturietan.com
manjuorlidnqo.com
chechelderpos.com
kalamindridro.com
-
vendor_id
260319
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 664 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.execmd.exedescription pid process target process PID 288 wrote to memory of 664 288 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe cmd.exe PID 288 wrote to memory of 664 288 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe cmd.exe PID 288 wrote to memory of 664 288 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe cmd.exe PID 288 wrote to memory of 664 288 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe cmd.exe PID 664 wrote to memory of 276 664 cmd.exe attrib.exe PID 664 wrote to memory of 276 664 cmd.exe attrib.exe PID 664 wrote to memory of 276 664 cmd.exe attrib.exe PID 664 wrote to memory of 276 664 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259396777.bat" "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"3⤵
- Views/modifies file attributes
PID:276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0e84a9b5fc7c9ff1e845aac9c30edac7
SHA16865c12cf70e38dec800e6d6ff85ecf40c96120f
SHA2560a7b3d4daefe32fc65ff9969e2b702e4c174da951b617a84b3db3ac74c1443cd
SHA512d70e821d178ecede717ce3edb5bcf9c6d34dfb7048695dc7bdf8b727521762cdc049e2534efa2734c7bc58395225640b11bb13d60788c9b0d06e9cff5008540e