Analysis
-
max time kernel
39s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 07:46
Static task
static1
Behavioral task
behavioral1
Sample
610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe
Resource
win7-20220414-en
General
-
Target
610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe
-
Size
281KB
-
MD5
45eb7b4ef35da0d16a5536cdaa9c7799
-
SHA1
0a874599297d2aa5ae66643fd2fcc2cc3a533a12
-
SHA256
610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0
-
SHA512
39c9efd66075046cd97d4a56e648426a5c1ff0278eefc04aa12c17518b7bd323fff92fb47d2915cfbc05583029dbbe37e5c58a5679c2b890f18c5d4ecfdc096c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
kvzmznkwrn.exepid process 1448 kvzmznkwrn.exe -
Loads dropped DLL 3 IoCs
Processes:
610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exekvzmznkwrn.exepid process 1364 610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe 1364 610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe 1448 kvzmznkwrn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exekvzmznkwrn.exedescription pid process target process PID 1364 wrote to memory of 1448 1364 610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe kvzmznkwrn.exe PID 1364 wrote to memory of 1448 1364 610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe kvzmznkwrn.exe PID 1364 wrote to memory of 1448 1364 610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe kvzmznkwrn.exe PID 1364 wrote to memory of 1448 1364 610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe kvzmznkwrn.exe PID 1448 wrote to memory of 1720 1448 kvzmznkwrn.exe kvzmznkwrn.exe PID 1448 wrote to memory of 1720 1448 kvzmznkwrn.exe kvzmznkwrn.exe PID 1448 wrote to memory of 1720 1448 kvzmznkwrn.exe kvzmznkwrn.exe PID 1448 wrote to memory of 1720 1448 kvzmznkwrn.exe kvzmznkwrn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe"C:\Users\Admin\AppData\Local\Temp\610a3b3d5908f770afc5198c6c9aece8b28afedabd492fa90d602df8e1915aa0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exeC:\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exe C:\Users\Admin\AppData\Local\Temp\qmpaltjdd2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exeC:\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exe C:\Users\Admin\AppData\Local\Temp\qmpaltjdd3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exeFilesize
4KB
MD57af6fd7843eb2d383a08f3d9d41eab61
SHA1cb5f684c50baa6dfedc148b3b629fecb9b5eb8ba
SHA256de0074a87982eaf5cf6fc02dc2ca578d209a85665ba458dd1148aeb8ff980765
SHA5127607efd28cdb8ee686a50d7977892729d4999613b01e2c7d8c588fd06ec0dad8e54975fbedf33969a1c2f150ba0a8ec70b1130fd895317648203468aa7a9ed75
-
C:\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exeFilesize
4KB
MD57af6fd7843eb2d383a08f3d9d41eab61
SHA1cb5f684c50baa6dfedc148b3b629fecb9b5eb8ba
SHA256de0074a87982eaf5cf6fc02dc2ca578d209a85665ba458dd1148aeb8ff980765
SHA5127607efd28cdb8ee686a50d7977892729d4999613b01e2c7d8c588fd06ec0dad8e54975fbedf33969a1c2f150ba0a8ec70b1130fd895317648203468aa7a9ed75
-
C:\Users\Admin\AppData\Local\Temp\qmpaltjddFilesize
5KB
MD5df54e923813902f353c2ccc8d89e5e97
SHA1fba331d592bbf07a4320506f76d73c835ef573fa
SHA2561d0f324a41cfbf8d29d1f91401c58f1283ac4209419dec4d0dfd2ddd0bb718f1
SHA512c097e478e386a666f8ff322e437c3bab24399c1dab373708867c7600be9209add688d85752393639ff5500c67eef19580cafaa108e4bfbb066ae9717335a38ff
-
C:\Users\Admin\AppData\Local\Temp\snpdt7niup2cx7xuuFilesize
103KB
MD54e7bfc3bd7bb656eab1d23d27854861e
SHA1564e95e844719d7d9b6c865a9091cbc950c8ae09
SHA2567eb949429704877f655fc47d164223aa96f791377f200eee42402d4dd4b9c0aa
SHA512f253033d221f0f42236514d02253aed87125d8005bae8f46e3144c7d5c00124a4bf97404b5313bbfe266664c683537d7ba33e6af6b60df164610bae1b32bef2c
-
\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exeFilesize
4KB
MD57af6fd7843eb2d383a08f3d9d41eab61
SHA1cb5f684c50baa6dfedc148b3b629fecb9b5eb8ba
SHA256de0074a87982eaf5cf6fc02dc2ca578d209a85665ba458dd1148aeb8ff980765
SHA5127607efd28cdb8ee686a50d7977892729d4999613b01e2c7d8c588fd06ec0dad8e54975fbedf33969a1c2f150ba0a8ec70b1130fd895317648203468aa7a9ed75
-
\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exeFilesize
4KB
MD57af6fd7843eb2d383a08f3d9d41eab61
SHA1cb5f684c50baa6dfedc148b3b629fecb9b5eb8ba
SHA256de0074a87982eaf5cf6fc02dc2ca578d209a85665ba458dd1148aeb8ff980765
SHA5127607efd28cdb8ee686a50d7977892729d4999613b01e2c7d8c588fd06ec0dad8e54975fbedf33969a1c2f150ba0a8ec70b1130fd895317648203468aa7a9ed75
-
\Users\Admin\AppData\Local\Temp\kvzmznkwrn.exeFilesize
4KB
MD57af6fd7843eb2d383a08f3d9d41eab61
SHA1cb5f684c50baa6dfedc148b3b629fecb9b5eb8ba
SHA256de0074a87982eaf5cf6fc02dc2ca578d209a85665ba458dd1148aeb8ff980765
SHA5127607efd28cdb8ee686a50d7977892729d4999613b01e2c7d8c588fd06ec0dad8e54975fbedf33969a1c2f150ba0a8ec70b1130fd895317648203468aa7a9ed75
-
memory/1364-54-0x0000000076461000-0x0000000076463000-memory.dmpFilesize
8KB
-
memory/1448-57-0x0000000000000000-mapping.dmp