Analysis
-
max time kernel
4294222s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
20-03-2022 03:16
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220311-en
General
-
Target
tmp.exe
-
Size
121KB
-
MD5
b20ca6fe5b3bee70b53659f5faa67363
-
SHA1
bccd58ad085f34263a2cc4c3763cc8494f1b96d7
-
SHA256
2feec256a92e51a00f8ed6546bac741beb33beec29225bf74eba71cb6e8562a0
-
SHA512
24a72e3834004af4fe432c9b616a8e3d3c14c50b9fbba70c70e2f9919cdfcf5e204c5e4c53f78e82c7d18ca764408654143b3ab0fa3e943070b6ec6355156ab1
Malware Config
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/Clipper/configure.php?cf6zrlhn=jewgod
DDB4ERa4pkhQpEzTM2tqH5erkh3kiwsYzi
rMqpEtFcgkDk4Ud5MkPjS2osTabHTYvyQW
0x4f44b62930873e9621d184124bbac2332095B506
XuBivrvExbRDVuxvkQmUEvrTekGE8TqjZn
TLkgaCYHhRAA8JUkDrVAJkG2YLU9ENo2He
t1JZTeSL7rfeM6EFKeHgTXAmeo6duwpS1y7
GAKPS6Z755ZSPBR56BIQVWRVIMHI3WFG3FYMUILI3KT66SM6JE7RY3GM
44r9pF77DzZCr8p9mH3WfqE6CwkYQ9SeB8Kze4ATLgXajcQsBwRrSvvHiaptf5SV5tctJ1b2PAiRgKZpeDX8tXiG1xzXqWw
18ZpXopjXhT4tx77Wq9TaFrBhaYBJSf7nJ
18ZpXopjXhT4tx77Wq9TaFrBhaYBJSf7nJ
0x8ffc221927Fba7F6AF76ddB34079DB81e33522a0
Ltc1q5kk8mmxz00950w5xr79294ekx9uwgf2nc49k9u
ronin:faf1e8b8f87de6e4f6a62dc0b7eaf780ca7b54a0
P1051297956
R902735303552
G561982719682
Z961119277510
H857611132936
X414492391445
https://steamcommunity.com/tradeoffer/new/?partner=1227946576&token=YywvcZtD
MFwPuVQvgbPCjLQsEdfkGXt59P8ujEM86f
ltc1q5kk8mmxz00950w5xr79294ekx9uwgf2nc49k9u
335iVerWY7yo1b2TkSHJ6huERCDnru3Stm
bc1q8hfqsgd86ck2rgy2mf2mw4jjwgvx4t3d5qc28c
t1JZTeSL7rfeM6EFKeHgTXAmeo6duwpS1y7
83bBbVYwnCmMZdbD4eSF8q84sGjm4z7B2S59kT2ytL9pguujq4pffNyGhE1d9X7QED6dVgzqBQ2viPTHvHYYkGdEKBYBLEj
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1948 subst.exe 1696 subst.exe 1668 subst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1440 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 776 wrote to memory of 1440 776 tmp.exe 27 PID 776 wrote to memory of 1440 776 tmp.exe 27 PID 776 wrote to memory of 1440 776 tmp.exe 27 PID 776 wrote to memory of 1440 776 tmp.exe 27 PID 1740 wrote to memory of 1948 1740 taskeng.exe 32 PID 1740 wrote to memory of 1948 1740 taskeng.exe 32 PID 1740 wrote to memory of 1948 1740 taskeng.exe 32 PID 1740 wrote to memory of 1948 1740 taskeng.exe 32 PID 1740 wrote to memory of 1696 1740 taskeng.exe 34 PID 1740 wrote to memory of 1696 1740 taskeng.exe 34 PID 1740 wrote to memory of 1696 1740 taskeng.exe 34 PID 1740 wrote to memory of 1696 1740 taskeng.exe 34 PID 1740 wrote to memory of 1668 1740 taskeng.exe 35 PID 1740 wrote to memory of 1668 1740 taskeng.exe 35 PID 1740 wrote to memory of 1668 1740 taskeng.exe 35 PID 1740 wrote to memory of 1668 1740 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr C:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Creates scheduled task(s)
PID:1440
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5596E2E6-4F6A-4C1A-B845-BB05FD0ECB2C} S-1-5-21-2199625441-3471261906-229485034-1000:DRLQIXCW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\CrashDumps\subst.exeC:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Executes dropped EXE
PID:1948
-
-
C:\Users\Admin\AppData\Local\CrashDumps\subst.exeC:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Executes dropped EXE
PID:1696
-
-
C:\Users\Admin\AppData\Local\CrashDumps\subst.exeC:\Users\Admin\AppData\Local\CrashDumps\subst.exe2⤵
- Executes dropped EXE
PID:1668
-