Analysis
-
max time kernel
4294183s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
27-03-2022 10:57
Static task
static1
Behavioral task
behavioral1
Sample
c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe
Resource
win7-20220311-en
General
-
Target
c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe
-
Size
8.2MB
-
MD5
478e874435babd1f3e3d9c382c3f868b
-
SHA1
9e8fccdfb2400cd286cfb8e9a7e2c4e4b932892c
-
SHA256
c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14
-
SHA512
23cbf711d51221989f7b344c523f3b0206bef562d3d7d0c2681c39eda515a292a3db5265ee9430f854561ad97412ceea4b5ec6c636e8d67c985c6042251e975c
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2004 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 640 IsCabView.exe 1728 topoedit.exe -
Loads dropped DLL 3 IoCs
pid Process 2020 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 908 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2004 2020 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 27 PID 2020 wrote to memory of 2004 2020 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 27 PID 2020 wrote to memory of 2004 2020 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 27 PID 2020 wrote to memory of 2004 2020 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 27 PID 2020 wrote to memory of 2004 2020 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 27 PID 2020 wrote to memory of 2004 2020 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 27 PID 2020 wrote to memory of 2004 2020 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 27 PID 2004 wrote to memory of 908 2004 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 28 PID 2004 wrote to memory of 908 2004 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 28 PID 2004 wrote to memory of 908 2004 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 28 PID 2004 wrote to memory of 908 2004 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 28 PID 2004 wrote to memory of 908 2004 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 28 PID 2004 wrote to memory of 908 2004 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 28 PID 2004 wrote to memory of 908 2004 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 28 PID 908 wrote to memory of 1592 908 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 29 PID 908 wrote to memory of 1592 908 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 29 PID 908 wrote to memory of 1592 908 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 29 PID 908 wrote to memory of 1592 908 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 29 PID 908 wrote to memory of 1592 908 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 29 PID 908 wrote to memory of 1592 908 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 29 PID 908 wrote to memory of 1592 908 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe 29 PID 1592 wrote to memory of 640 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 30 PID 1592 wrote to memory of 640 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 30 PID 1592 wrote to memory of 640 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 30 PID 1592 wrote to memory of 640 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 30 PID 1592 wrote to memory of 640 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 30 PID 1592 wrote to memory of 640 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 30 PID 1592 wrote to memory of 640 1592 c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe"C:\Users\Admin\AppData\Local\Temp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\is-P6O5P.tmp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp"C:\Users\Admin\AppData\Local\Temp\is-P6O5P.tmp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp" /SL5="$400DA,7739299,780800,C:\Users\Admin\AppData\Local\Temp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe"C:\Users\Admin\AppData\Local\Temp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe" /VERYSILENT3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\is-0T5ST.tmp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp"C:\Users\Admin\AppData\Local\Temp\is-0T5ST.tmp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp" /SL5="$500DA,7739299,780800,C:\Users\Admin\AppData\Local\Temp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\Directory Monitor\IsCabView.exe"C:\Users\Admin\AppData\Roaming\Directory Monitor\IsCabView.exe"5⤵
- Executes dropped EXE
PID:640
-
-
C:\Users\Admin\AppData\Roaming\Directory Monitor\topoedit.exe"C:\Users\Admin\AppData\Roaming\Directory Monitor\topoedit.exe"5⤵
- Executes dropped EXE
PID:1728
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-0T5ST.tmp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp
Filesize3.0MB
MD52193a48f602050074f8c3b779d7ff4d1
SHA133ce1181833b2f8009213d3237ccab96d8c27594
SHA256bf7e946ca708f8ee4815dbb2347f9067fb0e564127b4864c4b6f6bb13a091fa8
SHA51214d9078972dc5ac9a9621e869568427c02772e60714e11b8864dea37dd2760b32d74ffe870312aa064491962bbbb354850e6fef18666c6fde6556e4f163afe91
-
C:\Users\Admin\AppData\Local\Temp\is-P6O5P.tmp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp
Filesize3.0MB
MD52193a48f602050074f8c3b779d7ff4d1
SHA133ce1181833b2f8009213d3237ccab96d8c27594
SHA256bf7e946ca708f8ee4815dbb2347f9067fb0e564127b4864c4b6f6bb13a091fa8
SHA51214d9078972dc5ac9a9621e869568427c02772e60714e11b8864dea37dd2760b32d74ffe870312aa064491962bbbb354850e6fef18666c6fde6556e4f163afe91
-
Filesize
1.5MB
MD5e98f599801e6dd5e652f830591be9438
SHA1f3237ac703649c23e3eb3482fb0ac932d3c61801
SHA2567c0c00d7fe55cce5cc4deb15948eab7d69d61344c432aaaff168f1f15f69d78e
SHA512a1f12328e84b4bfabcf51dfac26e7a78cd598ef3aac5decfeedd5f032680b661054a1615870aec7e94b2d9e34eb6a656cf14b166e115cb18988f6424ff215706
-
Filesize
151KB
MD5d80a26a6547ce365a0645ba639be43f2
SHA14854e4b492254c2c980f6cd8875bdf55edfec7f5
SHA256a6edd9c0456423e561259f434ad4cab6d61ad7ff6bab80bbc13a0a72de410430
SHA512fd0e20c24becaecc32ceb789ed1fc9d31bdbdc2cb565c09a444678e6ba738561a4eb22cb5946180945f38ec71e82c11b0356ca1c226b2d6aa99e18cc0120f9fb
-
\Users\Admin\AppData\Local\Temp\is-0T5ST.tmp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp
Filesize3.0MB
MD52193a48f602050074f8c3b779d7ff4d1
SHA133ce1181833b2f8009213d3237ccab96d8c27594
SHA256bf7e946ca708f8ee4815dbb2347f9067fb0e564127b4864c4b6f6bb13a091fa8
SHA51214d9078972dc5ac9a9621e869568427c02772e60714e11b8864dea37dd2760b32d74ffe870312aa064491962bbbb354850e6fef18666c6fde6556e4f163afe91
-
\Users\Admin\AppData\Local\Temp\is-P6O5P.tmp\c48e5a61fd89ac5e950a37e1d81d2f733c16983d369dbedbb3a0c3e8c97f7b14.tmp
Filesize3.0MB
MD52193a48f602050074f8c3b779d7ff4d1
SHA133ce1181833b2f8009213d3237ccab96d8c27594
SHA256bf7e946ca708f8ee4815dbb2347f9067fb0e564127b4864c4b6f6bb13a091fa8
SHA51214d9078972dc5ac9a9621e869568427c02772e60714e11b8864dea37dd2760b32d74ffe870312aa064491962bbbb354850e6fef18666c6fde6556e4f163afe91
-
Filesize
1.5MB
MD5e98f599801e6dd5e652f830591be9438
SHA1f3237ac703649c23e3eb3482fb0ac932d3c61801
SHA2567c0c00d7fe55cce5cc4deb15948eab7d69d61344c432aaaff168f1f15f69d78e
SHA512a1f12328e84b4bfabcf51dfac26e7a78cd598ef3aac5decfeedd5f032680b661054a1615870aec7e94b2d9e34eb6a656cf14b166e115cb18988f6424ff215706