Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 21:45
Static task
static1
Behavioral task
behavioral1
Sample
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
Resource
win7-en-20211208
0 signatures
0 seconds
General
-
Target
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe
-
Size
619KB
-
MD5
a4a24a3daed6b4673884187b131c968b
-
SHA1
b20661090b7305239d75209bac8d2179f648dcaa
-
SHA256
a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df
-
SHA512
3f49b3876921b41483b907066c9f1f6a61d3fe759219c2db8cb048473b94ba52ab064fcc7c4615da2e1b8056dedc93bf22ed865ff4df442e5ba5c43b1c6082dc
Malware Config
Extracted
Family
gootkit
Botnet
260319
C2
sillikogermin.com
feferturietan.com
manjuorlidnqo.com
chechelderpos.com
kalamindridro.com
Attributes
-
vendor_id
260319
Signatures
-
Deletes itself 1 IoCs
pid Process 664 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 288 wrote to memory of 664 288 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe 27 PID 288 wrote to memory of 664 288 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe 27 PID 288 wrote to memory of 664 288 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe 27 PID 288 wrote to memory of 664 288 a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe 27 PID 664 wrote to memory of 276 664 cmd.exe 29 PID 664 wrote to memory of 276 664 cmd.exe 29 PID 664 wrote to memory of 276 664 cmd.exe 29 PID 664 wrote to memory of 276 664 cmd.exe 29 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 276 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259396777.bat" "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\a3c243afceb1fb38f25ae81816891d7d7c11ae76e80a43f31d2ceb9833f2f3df.exe"3⤵
- Views/modifies file attributes
PID:276
-
-