Analysis
-
max time kernel
67s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
submitted
20-07-2022 11:54
Behavioral task
behavioral1
Sample
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe
Resource
win10v2004-20220718-en
General
-
Target
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe
-
Size
1.9MB
-
MD5
9fa1ba3e7d6e32f240c790753cdaaf8e
-
SHA1
7bcea3fbfcb4c170c57c9050499e1fae40f5d731
-
SHA256
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87
-
SHA512
8d2fb58cb8776ead15f445671431eae13a00b48921e545c7ecbf91829015d818d663d9369f181de669ebb771b113c2f675c3a156fac5ede019b5fad9cb8c65fe
Malware Config
Extracted
C:\HOW-TO-DECRYPT-gn9cj.txt
Signatures
-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3352-130-0x0000000140000000-0x00000001401E2000-memory.dmp family_hades behavioral2/memory/976-137-0x0000000140000000-0x00000001401E2000-memory.dmp family_hades -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\ActiveImetc\Log cryptone C:\Users\Admin\AppData\Roaming\ActiveImetc\Log cryptone -
Executes dropped EXE 1 IoCs
Processes:
Logpid process 976 Log -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Logdescription ioc process File renamed C:\Users\Admin\Pictures\ResumeWrite.crw => C:\Users\Admin\Pictures\ResumeWrite.crw.gn9cj Log File opened for modification C:\Users\Admin\Pictures\ResumeWrite.crw.gn9cj Log File renamed C:\Users\Admin\Pictures\SelectClose.tiff => C:\Users\Admin\Pictures\SelectClose.tiff.gn9cj Log File opened for modification C:\Users\Admin\Pictures\SelectClose.tiff.gn9cj Log File renamed C:\Users\Admin\Pictures\SetGrant.tif => C:\Users\Admin\Pictures\SetGrant.tif.gn9cj Log File opened for modification C:\Users\Admin\Pictures\SetGrant.tif.gn9cj Log File renamed C:\Users\Admin\Pictures\MountBackup.tiff => C:\Users\Admin\Pictures\MountBackup.tiff.gn9cj Log File opened for modification C:\Users\Admin\Pictures\MountBackup.tiff.gn9cj Log -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exeLogcmd.execmd.exedescription pid process target process PID 3352 wrote to memory of 976 3352 fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe Log PID 3352 wrote to memory of 976 3352 fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe Log PID 976 wrote to memory of 3616 976 Log cmd.exe PID 976 wrote to memory of 3616 976 Log cmd.exe PID 3352 wrote to memory of 3508 3352 fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe cmd.exe PID 3352 wrote to memory of 3508 3352 fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe cmd.exe PID 3616 wrote to memory of 3816 3616 cmd.exe waitfor.exe PID 3616 wrote to memory of 3816 3616 cmd.exe waitfor.exe PID 3508 wrote to memory of 4008 3508 cmd.exe waitfor.exe PID 3508 wrote to memory of 4008 3508 cmd.exe waitfor.exe PID 3616 wrote to memory of 3992 3616 cmd.exe attrib.exe PID 3616 wrote to memory of 3992 3616 cmd.exe attrib.exe PID 3508 wrote to memory of 4980 3508 cmd.exe attrib.exe PID 3508 wrote to memory of 4980 3508 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 3992 attrib.exe 4980 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe"C:\Users\Admin\AppData\Local\Temp\fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Roaming\ActiveImetc\LogC:\Users\Admin\AppData\Roaming\ActiveImetc\Log /go2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Roaming\ActiveImetc\Log" & del "C:\Users\Admin\AppData\Roaming\ActiveImetc\Log" & rd "C:\Users\Admin\AppData\Roaming\ActiveImetc\"3⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y4⤵PID:3816
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\ActiveImetc\Log"4⤵
- Views/modifies file attributes
PID:3992
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe" & del "C:\Users\Admin\AppData\Local\Temp\fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe" & rd "C:\Users\Admin\AppData\Local\Temp\"2⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y3⤵PID:4008
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87.exe"3⤵
- Views/modifies file attributes
PID:4980
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD59fa1ba3e7d6e32f240c790753cdaaf8e
SHA17bcea3fbfcb4c170c57c9050499e1fae40f5d731
SHA256fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87
SHA5128d2fb58cb8776ead15f445671431eae13a00b48921e545c7ecbf91829015d818d663d9369f181de669ebb771b113c2f675c3a156fac5ede019b5fad9cb8c65fe
-
Filesize
1.9MB
MD59fa1ba3e7d6e32f240c790753cdaaf8e
SHA17bcea3fbfcb4c170c57c9050499e1fae40f5d731
SHA256fe997a590a68d98f95ac0b6c994ba69c3b2ece9841277b7fecd9dfaa6f589a87
SHA5128d2fb58cb8776ead15f445671431eae13a00b48921e545c7ecbf91829015d818d663d9369f181de669ebb771b113c2f675c3a156fac5ede019b5fad9cb8c65fe