Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-05-2022 16:21
Static task
static1
Behavioral task
behavioral1
Sample
d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe
-
Size
172KB
-
MD5
c3d04a3a5520a2f58516c2f0acbd4055
-
SHA1
f97acd5a5384d81f003d382b5c3a5ac448a9bb62
-
SHA256
d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa
-
SHA512
fd5bfb01b5f5c6d857620797ed4add60869ee662dcb5aaf721e3ee1a1fee01fcad08fd4b4b2eaa6dc626d6ac0438033f30d5affde3f12b159fdffe4bca5e41fd
Malware Config
Signatures
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 187.207.114.26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3008 d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe 3008 d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe 3800 d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe 3800 d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe 3504 metagenzip.exe 3504 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe 4928 metagenzip.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3800 d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3800 3008 d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe 82 PID 3008 wrote to memory of 3800 3008 d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe 82 PID 3008 wrote to memory of 3800 3008 d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe 82 PID 3504 wrote to memory of 4928 3504 metagenzip.exe 87 PID 3504 wrote to memory of 4928 3504 metagenzip.exe 87 PID 3504 wrote to memory of 4928 3504 metagenzip.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe"C:\Users\Admin\AppData\Local\Temp\d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe"C:\Users\Admin\AppData\Local\Temp\d82767751280c173d75b7eac6591bcff4ee4e3e03a683cf6436635a873299daa.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3800
-
-
C:\Windows\SysWOW64\metagenzip.exe"C:\Windows\SysWOW64\metagenzip.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\metagenzip.exe"C:\Windows\SysWOW64\metagenzip.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-