Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 21:25
Static task
static1
Behavioral task
behavioral1
Sample
c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe
Resource
win7-en-20211208
General
-
Target
c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe
-
Size
287KB
-
MD5
ef45a5b40438205dc050f4afebc278b5
-
SHA1
6760ea10d2e201b688d841ee11c841653ede94f5
-
SHA256
c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353
-
SHA512
fcceff6a644a09fdae46ffc306743277d6cc078c273b7dd6f85be97592aa23ca4631bf6564dbd130f9aaa38536066af3b61713a07984e9d7e0a9909cd635b021
Malware Config
Extracted
gootkit
6546
servicemanager.icu
partnerservice.xyz
-
vendor_id
6546
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 740 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.execmd.exedescription pid process target process PID 1736 wrote to memory of 740 1736 c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe cmd.exe PID 1736 wrote to memory of 740 1736 c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe cmd.exe PID 1736 wrote to memory of 740 1736 c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe cmd.exe PID 1736 wrote to memory of 740 1736 c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe cmd.exe PID 740 wrote to memory of 756 740 cmd.exe attrib.exe PID 740 wrote to memory of 756 740 cmd.exe attrib.exe PID 740 wrote to memory of 756 740 cmd.exe attrib.exe PID 740 wrote to memory of 756 740 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe"C:\Users\Admin\AppData\Local\Temp\c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259370850.bat" "C:\Users\Admin\AppData\Local\Temp\c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe"3⤵
- Views/modifies file attributes
PID:756
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6b23d0dfaad45014a0590329a975da6b
SHA143c108dffd8dfa71dc33e5913ae5144b5c8075c5
SHA256f6fc679300faa2cb5ebaae47bf6a2ffcbe61b24ef2f52c49bf4afa2588782794
SHA5127480fd5648fe1f5a5d5481e0aedb93bd69339f31e2793ad47614f47b9b55740921408d9298cef4ee1ae66eaa42659b743fe3697ca15d8d4b6d4b688602bdf913