Analysis
-
max time kernel
53s -
max time network
148s -
platform
windows10_x64 -
resource
win10-20220331-en -
submitted
14-04-2022 10:57
Static task
static1
Behavioral task
behavioral1
Sample
aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe
Resource
win10-20220331-en
General
-
Target
aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe
-
Size
271KB
-
MD5
f9a20cce97d6efd9e8d071420a8858b7
-
SHA1
17680094e9bdefe2f5205729f2b55be2ffca81fa
-
SHA256
aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d
-
SHA512
fb9055d9f19788e0c2d25f3f400165b630ef6f62604d6ee6a764c7a57f5f115737db4187be30641bca16af11d84d3afdde73b0790f5d43f682e10439ed7a1026
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2232 vvywdeos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2232 1732 aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe 66 PID 1732 wrote to memory of 2232 1732 aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe 66 PID 1732 wrote to memory of 2232 1732 aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe 66 PID 2232 wrote to memory of 3988 2232 vvywdeos.exe 68 PID 2232 wrote to memory of 3988 2232 vvywdeos.exe 68 PID 2232 wrote to memory of 3988 2232 vvywdeos.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe"C:\Users\Admin\AppData\Local\Temp\aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\vvywdeos.exeC:\Users\Admin\AppData\Local\Temp\vvywdeos.exe C:\Users\Admin\AppData\Local\Temp\pkjant2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\vvywdeos.exeC:\Users\Admin\AppData\Local\Temp\vvywdeos.exe C:\Users\Admin\AppData\Local\Temp\pkjant3⤵PID:3988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5024f5eb96b56308cfb64fe436e8de447
SHA1307585696be6985d5b7a3289dd4845f534868483
SHA256926d2ab16139435d5fda9b2badafb9d5eefb606faf59cd1c7b44a282a22feefb
SHA512e9754c234a15449ccc1e0d2f72c6a7cc63ef4887c2a5c8a93ab83905e42f3d85e77a1efe6b3e032e8b7d531a722c3b7da62349faf7921539947dd8e117bc650d
-
Filesize
4KB
MD535ba5cfdc4921d469e0f0959c2827785
SHA17295bd83ae1c581099495ec9d8fd9f9b62a97657
SHA256c3a8511a37564f699ee8c9ec8340f73790bf81e55f3327f4d787b13dc333e013
SHA51228be15b241179899df176541c469d49cd555e73871ee515bd2d931370fe416b8ad9b3464cfcb741156af126bcc1cdb9f5b5320671c16ffb1a25876d14952d4dd
-
Filesize
70KB
MD5f357de702f7b08ff1b60c2ca5bbdafa2
SHA1bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a
SHA2569b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5
SHA5129b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8
-
Filesize
70KB
MD5f357de702f7b08ff1b60c2ca5bbdafa2
SHA1bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a
SHA2569b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5
SHA5129b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8