Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 10:32
Static task
static1
Behavioral task
behavioral1
Sample
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe
Resource
win7-20220414-en
General
-
Target
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe
-
Size
1.9MB
-
MD5
20b489eaf040e049a47c082170acc9b8
-
SHA1
185eabfdd755f94c8eaa80baed99b5a4e06b3ca2
-
SHA256
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875
-
SHA512
1af4b40a3572aa0fdbd4c8b8cd974d0bff85d5c99203057e09abe222f24fce7e160d2155b8ec3b697bdd2efb65d1701a658c8d0f485ed0461af5a852561a6f3f
Malware Config
Extracted
socelars
http://www.zhxxjs.pw/Info/
http://www.allinfo.pw/
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpDiskScan.exepid process 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp 1708 DiskScan.exe -
Loads dropped DLL 6 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpWerFault.exepid process 1556 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 560 1708 WerFault.exe DiskScan.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmppid process 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmppid process 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpDiskScan.exedescription pid process target process PID 1556 wrote to memory of 280 1556 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 1556 wrote to memory of 280 1556 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 1556 wrote to memory of 280 1556 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 1556 wrote to memory of 280 1556 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 1556 wrote to memory of 280 1556 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 1556 wrote to memory of 280 1556 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 1556 wrote to memory of 280 1556 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp PID 280 wrote to memory of 1708 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp DiskScan.exe PID 280 wrote to memory of 1708 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp DiskScan.exe PID 280 wrote to memory of 1708 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp DiskScan.exe PID 280 wrote to memory of 1708 280 396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp DiskScan.exe PID 1708 wrote to memory of 560 1708 DiskScan.exe WerFault.exe PID 1708 wrote to memory of 560 1708 DiskScan.exe WerFault.exe PID 1708 wrote to memory of 560 1708 DiskScan.exe WerFault.exe PID 1708 wrote to memory of 560 1708 DiskScan.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe"C:\Users\Admin\AppData\Local\Temp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-EJF2R.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp"C:\Users\Admin\AppData\Local\Temp\is-EJF2R.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmp" /SL5="$60122,1244772,784384,C:\Users\Admin\AppData\Local\Temp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 4924⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD546d380dc43a98463afcdf562f55416bd
SHA1c92edab2128908f8c86f6ed6e971db4b8b2aa77d
SHA256f28d5f9277e2c0ee3cdee500666991e02dc8040e4790ab3d837dcf3b432ca4cc
SHA5126736239217beb91b257954ccd1d170a596fcf3a06cf40b99133f18519e5713310113a5d21aded0f78392f1565b544b63c977e17f861101e9640074049195e100
-
C:\Users\Admin\AppData\Local\Temp\is-EJF2R.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpFilesize
2.5MB
MD55f28081693a97336a2d7df877044fcde
SHA19d710db6c618906d9b2e355bb8b2e0b5ab014bad
SHA2565751a4c9713b058ba5cd757c405865702bee0926d5086efbaa4add627984362d
SHA51248a8f91d57456409d82e8c5277a494e44e6d71d315cf1d5cfe9bea0ad8797d20a587d2fa7a123cbc4439eb74e6411f7d39743ddf4780abf3826cc7072276fb2f
-
C:\Users\Admin\AppData\Local\Temp\is-EJF2R.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpFilesize
2.5MB
MD55f28081693a97336a2d7df877044fcde
SHA19d710db6c618906d9b2e355bb8b2e0b5ab014bad
SHA2565751a4c9713b058ba5cd757c405865702bee0926d5086efbaa4add627984362d
SHA51248a8f91d57456409d82e8c5277a494e44e6d71d315cf1d5cfe9bea0ad8797d20a587d2fa7a123cbc4439eb74e6411f7d39743ddf4780abf3826cc7072276fb2f
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD546d380dc43a98463afcdf562f55416bd
SHA1c92edab2128908f8c86f6ed6e971db4b8b2aa77d
SHA256f28d5f9277e2c0ee3cdee500666991e02dc8040e4790ab3d837dcf3b432ca4cc
SHA5126736239217beb91b257954ccd1d170a596fcf3a06cf40b99133f18519e5713310113a5d21aded0f78392f1565b544b63c977e17f861101e9640074049195e100
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD546d380dc43a98463afcdf562f55416bd
SHA1c92edab2128908f8c86f6ed6e971db4b8b2aa77d
SHA256f28d5f9277e2c0ee3cdee500666991e02dc8040e4790ab3d837dcf3b432ca4cc
SHA5126736239217beb91b257954ccd1d170a596fcf3a06cf40b99133f18519e5713310113a5d21aded0f78392f1565b544b63c977e17f861101e9640074049195e100
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD546d380dc43a98463afcdf562f55416bd
SHA1c92edab2128908f8c86f6ed6e971db4b8b2aa77d
SHA256f28d5f9277e2c0ee3cdee500666991e02dc8040e4790ab3d837dcf3b432ca4cc
SHA5126736239217beb91b257954ccd1d170a596fcf3a06cf40b99133f18519e5713310113a5d21aded0f78392f1565b544b63c977e17f861101e9640074049195e100
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD546d380dc43a98463afcdf562f55416bd
SHA1c92edab2128908f8c86f6ed6e971db4b8b2aa77d
SHA256f28d5f9277e2c0ee3cdee500666991e02dc8040e4790ab3d837dcf3b432ca4cc
SHA5126736239217beb91b257954ccd1d170a596fcf3a06cf40b99133f18519e5713310113a5d21aded0f78392f1565b544b63c977e17f861101e9640074049195e100
-
\Users\Admin\AppData\Local\Temp\DiskProtect190001\DiskScan.exeFilesize
1.1MB
MD546d380dc43a98463afcdf562f55416bd
SHA1c92edab2128908f8c86f6ed6e971db4b8b2aa77d
SHA256f28d5f9277e2c0ee3cdee500666991e02dc8040e4790ab3d837dcf3b432ca4cc
SHA5126736239217beb91b257954ccd1d170a596fcf3a06cf40b99133f18519e5713310113a5d21aded0f78392f1565b544b63c977e17f861101e9640074049195e100
-
\Users\Admin\AppData\Local\Temp\is-EJF2R.tmp\396db407c256a9d986e6c9236b138a45a8d036db66fada0986c1de5358fa9875.tmpFilesize
2.5MB
MD55f28081693a97336a2d7df877044fcde
SHA19d710db6c618906d9b2e355bb8b2e0b5ab014bad
SHA2565751a4c9713b058ba5cd757c405865702bee0926d5086efbaa4add627984362d
SHA51248a8f91d57456409d82e8c5277a494e44e6d71d315cf1d5cfe9bea0ad8797d20a587d2fa7a123cbc4439eb74e6411f7d39743ddf4780abf3826cc7072276fb2f
-
memory/280-58-0x0000000000000000-mapping.dmp
-
memory/280-62-0x00000000742F1000-0x00000000742F3000-memory.dmpFilesize
8KB
-
memory/560-69-0x0000000000000000-mapping.dmp
-
memory/1556-68-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/1556-61-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/1556-54-0x0000000075541000-0x0000000075543000-memory.dmpFilesize
8KB
-
memory/1556-55-0x0000000000400000-0x00000000004CD000-memory.dmpFilesize
820KB
-
memory/1708-65-0x0000000000000000-mapping.dmp