Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 21:25
Static task
static1
Behavioral task
behavioral1
Sample
c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe
Resource
win7-en-20211208
General
-
Target
c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe
-
Size
287KB
-
MD5
ef45a5b40438205dc050f4afebc278b5
-
SHA1
6760ea10d2e201b688d841ee11c841653ede94f5
-
SHA256
c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353
-
SHA512
fcceff6a644a09fdae46ffc306743277d6cc078c273b7dd6f85be97592aa23ca4631bf6564dbd130f9aaa38536066af3b61713a07984e9d7e0a9909cd635b021
Malware Config
Extracted
gootkit
6546
servicemanager.icu
partnerservice.xyz
-
vendor_id
6546
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe -
Deletes itself 1 IoCs
pid Process 740 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1736 wrote to memory of 740 1736 c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe 27 PID 1736 wrote to memory of 740 1736 c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe 27 PID 1736 wrote to memory of 740 1736 c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe 27 PID 1736 wrote to memory of 740 1736 c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe 27 PID 740 wrote to memory of 756 740 cmd.exe 29 PID 740 wrote to memory of 756 740 cmd.exe 29 PID 740 wrote to memory of 756 740 cmd.exe 29 PID 740 wrote to memory of 756 740 cmd.exe 29 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 756 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe"C:\Users\Admin\AppData\Local\Temp\c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259370850.bat" "C:\Users\Admin\AppData\Local\Temp\c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\c1ae38afb6c82b9107868d66318095f1c00f1e92dddc0ee953c23a8de4ace353.exe"3⤵
- Views/modifies file attributes
PID:756
-
-