Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-06-2022 20:40
Static task
static1
Behavioral task
behavioral1
Sample
2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe
Resource
win7-20220414-en
General
-
Target
2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe
-
Size
1.9MB
-
MD5
15f72ede1670137cc1be6aa7322cfaf7
-
SHA1
39223904b1c8b1a039f7fff34978e2723f2cf684
-
SHA256
2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc
-
SHA512
e9922cbea70205943d815c1592895f7e4d3fad97fed1a514ec32e86c711c9eab77b785fc94135c2e2b323e528567580f9a6d3c66f92784690e3c0180cb2b59e1
Malware Config
Extracted
socelars
http://www.zhxxjs.pw/Info/
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmpDiskScan.exepid process 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp 1720 DiskScan.exe -
Loads dropped DLL 6 IoCs
Processes:
2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmpWerFault.exepid process 2040 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe 1076 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1076 1720 WerFault.exe DiskScan.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmppid process 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmppid process 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmpDiskScan.exedescription pid process target process PID 2040 wrote to memory of 900 2040 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp PID 2040 wrote to memory of 900 2040 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp PID 2040 wrote to memory of 900 2040 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp PID 2040 wrote to memory of 900 2040 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp PID 2040 wrote to memory of 900 2040 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp PID 2040 wrote to memory of 900 2040 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp PID 2040 wrote to memory of 900 2040 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp PID 900 wrote to memory of 1720 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp DiskScan.exe PID 900 wrote to memory of 1720 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp DiskScan.exe PID 900 wrote to memory of 1720 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp DiskScan.exe PID 900 wrote to memory of 1720 900 2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp DiskScan.exe PID 1720 wrote to memory of 1076 1720 DiskScan.exe WerFault.exe PID 1720 wrote to memory of 1076 1720 DiskScan.exe WerFault.exe PID 1720 wrote to memory of 1076 1720 DiskScan.exe WerFault.exe PID 1720 wrote to memory of 1076 1720 DiskScan.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe"C:\Users\Admin\AppData\Local\Temp\2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-ORANM.tmp\2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp"C:\Users\Admin\AppData\Local\Temp\is-ORANM.tmp\2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmp" /SL5="$60120,1242771,784384,C:\Users\Admin\AppData\Local\Temp\2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 4924⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD5a4f31741712ef63adf483ba328799134
SHA10fcc0a7fad9a4cf0e608c62546f5e39494585157
SHA2563b663ede7e2bdebaab3e2253f6c135b133a91edf92147692f6b87ff301a30d91
SHA5123d15514506fca998b23df148bb59abe0d25c227c410c367f5577d95d5e14ac31eca78852e45a03caabe47685140d178548eb8aa10ac62965d24a304e370eb31d
-
C:\Users\Admin\AppData\Local\Temp\is-ORANM.tmp\2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmpFilesize
2.5MB
MD55f28081693a97336a2d7df877044fcde
SHA19d710db6c618906d9b2e355bb8b2e0b5ab014bad
SHA2565751a4c9713b058ba5cd757c405865702bee0926d5086efbaa4add627984362d
SHA51248a8f91d57456409d82e8c5277a494e44e6d71d315cf1d5cfe9bea0ad8797d20a587d2fa7a123cbc4439eb74e6411f7d39743ddf4780abf3826cc7072276fb2f
-
C:\Users\Admin\AppData\Local\Temp\is-ORANM.tmp\2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmpFilesize
2.5MB
MD55f28081693a97336a2d7df877044fcde
SHA19d710db6c618906d9b2e355bb8b2e0b5ab014bad
SHA2565751a4c9713b058ba5cd757c405865702bee0926d5086efbaa4add627984362d
SHA51248a8f91d57456409d82e8c5277a494e44e6d71d315cf1d5cfe9bea0ad8797d20a587d2fa7a123cbc4439eb74e6411f7d39743ddf4780abf3826cc7072276fb2f
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD5a4f31741712ef63adf483ba328799134
SHA10fcc0a7fad9a4cf0e608c62546f5e39494585157
SHA2563b663ede7e2bdebaab3e2253f6c135b133a91edf92147692f6b87ff301a30d91
SHA5123d15514506fca998b23df148bb59abe0d25c227c410c367f5577d95d5e14ac31eca78852e45a03caabe47685140d178548eb8aa10ac62965d24a304e370eb31d
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD5a4f31741712ef63adf483ba328799134
SHA10fcc0a7fad9a4cf0e608c62546f5e39494585157
SHA2563b663ede7e2bdebaab3e2253f6c135b133a91edf92147692f6b87ff301a30d91
SHA5123d15514506fca998b23df148bb59abe0d25c227c410c367f5577d95d5e14ac31eca78852e45a03caabe47685140d178548eb8aa10ac62965d24a304e370eb31d
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD5a4f31741712ef63adf483ba328799134
SHA10fcc0a7fad9a4cf0e608c62546f5e39494585157
SHA2563b663ede7e2bdebaab3e2253f6c135b133a91edf92147692f6b87ff301a30d91
SHA5123d15514506fca998b23df148bb59abe0d25c227c410c367f5577d95d5e14ac31eca78852e45a03caabe47685140d178548eb8aa10ac62965d24a304e370eb31d
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD5a4f31741712ef63adf483ba328799134
SHA10fcc0a7fad9a4cf0e608c62546f5e39494585157
SHA2563b663ede7e2bdebaab3e2253f6c135b133a91edf92147692f6b87ff301a30d91
SHA5123d15514506fca998b23df148bb59abe0d25c227c410c367f5577d95d5e14ac31eca78852e45a03caabe47685140d178548eb8aa10ac62965d24a304e370eb31d
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD5a4f31741712ef63adf483ba328799134
SHA10fcc0a7fad9a4cf0e608c62546f5e39494585157
SHA2563b663ede7e2bdebaab3e2253f6c135b133a91edf92147692f6b87ff301a30d91
SHA5123d15514506fca998b23df148bb59abe0d25c227c410c367f5577d95d5e14ac31eca78852e45a03caabe47685140d178548eb8aa10ac62965d24a304e370eb31d
-
\Users\Admin\AppData\Local\Temp\is-ORANM.tmp\2d1106c065a163fbcef5b60ba5eceb22b75e2024e205c84494319fe1d912cffc.tmpFilesize
2.5MB
MD55f28081693a97336a2d7df877044fcde
SHA19d710db6c618906d9b2e355bb8b2e0b5ab014bad
SHA2565751a4c9713b058ba5cd757c405865702bee0926d5086efbaa4add627984362d
SHA51248a8f91d57456409d82e8c5277a494e44e6d71d315cf1d5cfe9bea0ad8797d20a587d2fa7a123cbc4439eb74e6411f7d39743ddf4780abf3826cc7072276fb2f
-
memory/900-58-0x0000000000000000-mapping.dmp
-
memory/900-62-0x0000000074C61000-0x0000000074C63000-memory.dmpFilesize
8KB
-
memory/1076-69-0x0000000000000000-mapping.dmp
-
memory/1720-65-0x0000000000000000-mapping.dmp
-
memory/2040-55-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/2040-68-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/2040-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmpFilesize
8KB
-
memory/2040-61-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB