Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
03-03-2022 11:09
Static task
static1
General
-
Target
595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe
-
Size
9.5MB
-
MD5
686b40dcb167653cb7a8463928c26af1
-
SHA1
d6146b6fdf516223735e4e881fa797432dff3923
-
SHA256
595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470
-
SHA512
c40d9c17e1b6d1100425b15d0f800562579b935a83e1c9b8f4099d8a4262b7287f545f4c0a00ab040c92e239fe946416242461dd712d4cb63deca5f651558f8f
Malware Config
Extracted
Family
systembc
C2
5.101.78.2:4127
192.53.123.202:4127
Signatures
-
Babadeda Crypter 3 IoCs
resource yara_rule behavioral1/files/0x0006000000019e34-142.dat family_babadeda behavioral1/memory/3736-152-0x00000000046A0000-0x00000000088A0000-memory.dmp family_babadeda behavioral1/memory/1928-161-0x0000000001BC0000-0x0000000005DC0000-memory.dmp family_babadeda -
Executes dropped EXE 5 IoCs
pid Process 3900 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 3784 tracegen.exe 3736 PDapp.exe 1928 PDapp.exe -
Loads dropped DLL 16 IoCs
pid Process 3736 PDapp.exe 3736 PDapp.exe 3736 PDapp.exe 3736 PDapp.exe 3736 PDapp.exe 3736 PDapp.exe 3736 PDapp.exe 3736 PDapp.exe 1928 PDapp.exe 1928 PDapp.exe 1928 PDapp.exe 1928 PDapp.exe 1928 PDapp.exe 1928 PDapp.exe 1928 PDapp.exe 1928 PDapp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\wow64.job PDapp.exe File opened for modification C:\Windows\Tasks\wow64.job PDapp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3900 2412 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe 42 PID 2412 wrote to memory of 3900 2412 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe 42 PID 2412 wrote to memory of 3900 2412 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe 42 PID 3900 wrote to memory of 3600 3900 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 43 PID 3900 wrote to memory of 3600 3900 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 43 PID 3900 wrote to memory of 3600 3900 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 43 PID 3600 wrote to memory of 4000 3600 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe 44 PID 3600 wrote to memory of 4000 3600 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe 44 PID 3600 wrote to memory of 4000 3600 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe 44 PID 4000 wrote to memory of 3784 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 45 PID 4000 wrote to memory of 3784 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 45 PID 4000 wrote to memory of 3784 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 45 PID 4000 wrote to memory of 3736 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 47 PID 4000 wrote to memory of 3736 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 47 PID 4000 wrote to memory of 3736 4000 595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe"C:\Users\Admin\AppData\Local\Temp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\is-LAJ6L.tmp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp"C:\Users\Admin\AppData\Local\Temp\is-LAJ6L.tmp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp" /SL5="$4014E,9084029,780800,C:\Users\Admin\AppData\Local\Temp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe"C:\Users\Admin\AppData\Local\Temp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe" /VERYSILENT3⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\is-4NNET.tmp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp"C:\Users\Admin\AppData\Local\Temp\is-4NNET.tmp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.tmp" /SL5="$5014E,9084029,780800,C:\Users\Admin\AppData\Local\Temp\595e1545c53d27fb1315e70b241e66f44b28a49be59a717ca4936d167e121470.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\tracegen.exe"C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\tracegen.exe"5⤵
- Executes dropped EXE
PID:3784
-
-
C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\PDapp.exe"C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\PDapp.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:3736
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\PDapp.exe"C:\Users\Admin\AppData\Roaming\Sure Cuts A Lot 5\PDapp.exe" start1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928