Analysis
-
max time kernel
72s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 13:24
Static task
static1
Behavioral task
behavioral1
Sample
2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe
Resource
win10v2004-20220414-en
General
-
Target
2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe
-
Size
414KB
-
MD5
9b7f3d85f89fce7fd23cba7e4ed48ea0
-
SHA1
7fe0138a8a5c1218ecf12ce3430f7ba3e92e027f
-
SHA256
2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652
-
SHA512
340c6ab0a6e44d66c8e9e9097e3607d1399df7f740ee23d95b259befbd152e659cda488f304223a61cbc6bf1c377fd780ff5bf4d9a0b102d5e7e0cdc05213ab0
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 880 2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe 880 2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1236 880 WerFault.exe 6 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 880 wrote to memory of 1236 880 2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe 27 PID 880 wrote to memory of 1236 880 2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe 27 PID 880 wrote to memory of 1236 880 2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe 27 PID 880 wrote to memory of 1236 880 2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe"C:\Users\Admin\AppData\Local\Temp\2ddb9a2e81f092f5ae66d8922b3c19aefa92a88b99f89c37ee11258bff4b8652.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 4842⤵
- Program crash
PID:1236
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59fc7360e69776937f2238705b29aad49
SHA11243db16ff8f739ed3b559d8dd39d5ee99bdbbaf
SHA256e25ea119e9e3d2e1be97f8109470c0237122218dd5deaa404d1586205dd4a926
SHA5122465466aafff303eb051b061479b7ea90abbf3a8c9a1f886cafe175fc0b677f954d1e41a20f1aa253eb05dfbc0a25847d2b5145c831e71e43dc4c7887128faee
-
Filesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06