Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 22:40
Static task
static1
Behavioral task
behavioral1
Sample
5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe
Resource
win7-en-20211208
General
-
Target
5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe
-
Size
286KB
-
MD5
350c0b08ec0452a070bbed6fc730b17c
-
SHA1
15d23e2d535bf6540491fdaae6ef8d617ec47930
-
SHA256
5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468
-
SHA512
725cd3062b4aa68eb93a7bc1a3f7318f84cf003a296e2bfe11b884579ea8a0f6e25d86821fce3c4c40ae0e5fb67ab167aafafb65e9d7451c9923327eb9123a3c
Malware Config
Extracted
gootkit
6546
servicemanager.icu
partnerservice.xyz
-
vendor_id
6546
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe -
Deletes itself 1 IoCs
pid Process 1492 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1492 1188 5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe 27 PID 1188 wrote to memory of 1492 1188 5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe 27 PID 1188 wrote to memory of 1492 1188 5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe 27 PID 1188 wrote to memory of 1492 1188 5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe 27 PID 1492 wrote to memory of 752 1492 cmd.exe 29 PID 1492 wrote to memory of 752 1492 cmd.exe 29 PID 1492 wrote to memory of 752 1492 cmd.exe 29 PID 1492 wrote to memory of 752 1492 cmd.exe 29 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 752 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe"C:\Users\Admin\AppData\Local\Temp\5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259377854.bat" "C:\Users\Admin\AppData\Local\Temp\5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\5766bffa91f87cd08582fac05209c5d8d9356ad88e15499038dc624c0ccbc468.exe"3⤵
- Views/modifies file attributes
PID:752
-
-