Analysis
-
max time kernel
4294179s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-04-2022 05:47
Static task
static1
Behavioral task
behavioral1
Sample
dekont.exe
Resource
win7-20220310-en
General
-
Target
dekont.exe
-
Size
269KB
-
MD5
1218da9d299571a80c774838d2a55516
-
SHA1
1bce59e7afb303e0c170cb8f6fdb5a1806e41eda
-
SHA256
50a9cc4decaf32975996710740956b5a9c4985c50ded5a2bb8611945263af65a
-
SHA512
96fef1449441f526e05a1c514d4cb464bbaa2156e8c2e1c84563ac8eb22ee132c2e3593bd09e0516ba171879b4c52d71ddf064abb9dc2a7c1e23f54ecb930895
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
nuavxkimr.exepid process 1068 nuavxkimr.exe -
Loads dropped DLL 2 IoCs
Processes:
dekont.exenuavxkimr.exepid process 940 dekont.exe 1068 nuavxkimr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
dekont.exenuavxkimr.exedescription pid process target process PID 940 wrote to memory of 1068 940 dekont.exe nuavxkimr.exe PID 940 wrote to memory of 1068 940 dekont.exe nuavxkimr.exe PID 940 wrote to memory of 1068 940 dekont.exe nuavxkimr.exe PID 940 wrote to memory of 1068 940 dekont.exe nuavxkimr.exe PID 1068 wrote to memory of 1884 1068 nuavxkimr.exe nuavxkimr.exe PID 1068 wrote to memory of 1884 1068 nuavxkimr.exe nuavxkimr.exe PID 1068 wrote to memory of 1884 1068 nuavxkimr.exe nuavxkimr.exe PID 1068 wrote to memory of 1884 1068 nuavxkimr.exe nuavxkimr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dekont.exe"C:\Users\Admin\AppData\Local\Temp\dekont.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nuavxkimr.exeC:\Users\Admin\AppData\Local\Temp\nuavxkimr.exe C:\Users\Admin\AppData\Local\Temp\vdmtqslp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nuavxkimr.exeC:\Users\Admin\AppData\Local\Temp\nuavxkimr.exe C:\Users\Admin\AppData\Local\Temp\vdmtqslp3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b0uszk89s3fikiiz8qd9Filesize
212KB
MD53c3affba98d209d52ef52d57e3fb1867
SHA16bdc62a7764b6ac644ccc2b2a95eb6a02928840c
SHA2563769aac7a7f7c2763c0b0038bf1dc0f753c2fa79539ef9f709ca103a012e3677
SHA512e36aec4d0b8b394c72a14778776b38816ee1e153123eaa2a22707e45955eeacb6a43a47cbf7873967ab8bc52919820269c6f07d32adb03ae0f899c9866edfb45
-
C:\Users\Admin\AppData\Local\Temp\nuavxkimr.exeFilesize
69KB
MD5ef5a62fa6896f9f8fad9ed88dcba1571
SHA1e0cc7fd742a95d1080abe1939fc619f0c456e858
SHA256add218fc58b4c754930bd49bc28ede74ff3e279bcddc67ed035c03734aeac241
SHA512825d91965528c89c4127b7550886b67d11bb76cfd6501fd38e9776b98dfee255e2f387109d76a732ce2f77588ba04b8c4002fa601de7ef5e93f2b92b8875276b
-
C:\Users\Admin\AppData\Local\Temp\nuavxkimr.exeFilesize
69KB
MD5ef5a62fa6896f9f8fad9ed88dcba1571
SHA1e0cc7fd742a95d1080abe1939fc619f0c456e858
SHA256add218fc58b4c754930bd49bc28ede74ff3e279bcddc67ed035c03734aeac241
SHA512825d91965528c89c4127b7550886b67d11bb76cfd6501fd38e9776b98dfee255e2f387109d76a732ce2f77588ba04b8c4002fa601de7ef5e93f2b92b8875276b
-
C:\Users\Admin\AppData\Local\Temp\vdmtqslpFilesize
4KB
MD5f9cf556dc24692d529f57bc7e3845bfe
SHA13beb526650e5f39b2296b85a8f1b7adbf99c2673
SHA2566055e8633adf7c0acacc045ffe055fca53e5362fbbbe1455cfdd20bd17b0df36
SHA512359312bc7dd7fa9821528041a548b89ab5f1f0a9f084bf945bcc88849b1c6b12a7d78c1f064f67defca24dfa1ee65e6c215592e3304b6397139063edce27fc42
-
\Users\Admin\AppData\Local\Temp\nuavxkimr.exeFilesize
69KB
MD5ef5a62fa6896f9f8fad9ed88dcba1571
SHA1e0cc7fd742a95d1080abe1939fc619f0c456e858
SHA256add218fc58b4c754930bd49bc28ede74ff3e279bcddc67ed035c03734aeac241
SHA512825d91965528c89c4127b7550886b67d11bb76cfd6501fd38e9776b98dfee255e2f387109d76a732ce2f77588ba04b8c4002fa601de7ef5e93f2b92b8875276b
-
\Users\Admin\AppData\Local\Temp\nuavxkimr.exeFilesize
69KB
MD5ef5a62fa6896f9f8fad9ed88dcba1571
SHA1e0cc7fd742a95d1080abe1939fc619f0c456e858
SHA256add218fc58b4c754930bd49bc28ede74ff3e279bcddc67ed035c03734aeac241
SHA512825d91965528c89c4127b7550886b67d11bb76cfd6501fd38e9776b98dfee255e2f387109d76a732ce2f77588ba04b8c4002fa601de7ef5e93f2b92b8875276b
-
memory/940-54-0x0000000076861000-0x0000000076863000-memory.dmpFilesize
8KB
-
memory/1068-56-0x0000000000000000-mapping.dmp