Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
submitted
20-07-2022 13:48
Behavioral task
behavioral1
Sample
e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe
Resource
win10v2004-20220718-en
General
-
Target
e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe
-
Size
1.8MB
-
MD5
ab99a5767c1d598c49b1f5d615a76302
-
SHA1
b4061d4227e08cfaa3190dea9926571fca2736a1
-
SHA256
e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0
-
SHA512
f12db9f7bfaa22747cc38a10a317bd6c7af483f9275f5981186d74435dda80df6faf53d10ee47c63b4b213310d29ca0eef5966983ecaa0dd7463a50c62cfab0c
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW-TO-DECRYPT-cm99v.txt
http://o76s3m7l5ogig4u5.onion
Extracted
C:\Users\Admin\Searches\HOW-TO-DECRYPT-cm99v.txt
http://o76s3m7l5ogig4u5.onion
Signatures
-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1904-54-0x0000000140000000-0x00000001401D9000-memory.dmp family_hades behavioral1/memory/952-62-0x0000000140000000-0x00000001401D9000-memory.dmp family_hades -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\PowerLicensing\Studio cryptone \Users\Admin\AppData\Roaming\PowerLicensing\Studio cryptone \Users\Admin\AppData\Roaming\PowerLicensing\Studio cryptone C:\Users\Admin\AppData\Roaming\PowerLicensing\Studio cryptone -
Executes dropped EXE 1 IoCs
Processes:
Studiopid process 952 Studio -
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
Studiodescription ioc process File opened for modification C:\Users\Admin\Pictures\ProtectEnable.png.cm99v Studio File opened for modification C:\Users\Admin\Pictures\CopyCheckpoint.raw.cm99v Studio File opened for modification C:\Users\Admin\Pictures\MergeReset.crw.cm99v Studio File renamed C:\Users\Admin\Pictures\MergeReset.crw => C:\Users\Admin\Pictures\MergeReset.crw.cm99v Studio File renamed C:\Users\Admin\Pictures\SkipBackup.tif => C:\Users\Admin\Pictures\SkipBackup.tif.cm99v Studio File renamed C:\Users\Admin\Pictures\SetMove.png => C:\Users\Admin\Pictures\SetMove.png.cm99v Studio File renamed C:\Users\Admin\Pictures\CopyCheckpoint.raw => C:\Users\Admin\Pictures\CopyCheckpoint.raw.cm99v Studio File opened for modification C:\Users\Admin\Pictures\ExportUnblock.png.cm99v Studio File renamed C:\Users\Admin\Pictures\ExpandImport.crw => C:\Users\Admin\Pictures\ExpandImport.crw.cm99v Studio File opened for modification C:\Users\Admin\Pictures\ExpandImport.crw.cm99v Studio File renamed C:\Users\Admin\Pictures\ExportUnblock.png => C:\Users\Admin\Pictures\ExportUnblock.png.cm99v Studio File renamed C:\Users\Admin\Pictures\ProtectEnable.png => C:\Users\Admin\Pictures\ProtectEnable.png.cm99v Studio File opened for modification C:\Users\Admin\Pictures\SetMove.png.cm99v Studio File opened for modification C:\Users\Admin\Pictures\SkipBackup.tif.cm99v Studio File renamed C:\Users\Admin\Pictures\DenyAssert.crw => C:\Users\Admin\Pictures\DenyAssert.crw.cm99v Studio File opened for modification C:\Users\Admin\Pictures\DenyAssert.crw.cm99v Studio -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1492 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exepid process 1904 e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe 1904 e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exeStudiocmd.execmd.exedescription pid process target process PID 1904 wrote to memory of 952 1904 e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe Studio PID 1904 wrote to memory of 952 1904 e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe Studio PID 1904 wrote to memory of 952 1904 e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe Studio PID 952 wrote to memory of 1648 952 Studio cmd.exe PID 952 wrote to memory of 1648 952 Studio cmd.exe PID 952 wrote to memory of 1648 952 Studio cmd.exe PID 1648 wrote to memory of 1084 1648 cmd.exe waitfor.exe PID 1648 wrote to memory of 1084 1648 cmd.exe waitfor.exe PID 1648 wrote to memory of 1084 1648 cmd.exe waitfor.exe PID 1904 wrote to memory of 1492 1904 e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe cmd.exe PID 1904 wrote to memory of 1492 1904 e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe cmd.exe PID 1904 wrote to memory of 1492 1904 e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe cmd.exe PID 1648 wrote to memory of 1712 1648 cmd.exe attrib.exe PID 1648 wrote to memory of 1712 1648 cmd.exe attrib.exe PID 1648 wrote to memory of 1712 1648 cmd.exe attrib.exe PID 1492 wrote to memory of 912 1492 cmd.exe waitfor.exe PID 1492 wrote to memory of 912 1492 cmd.exe waitfor.exe PID 1492 wrote to memory of 912 1492 cmd.exe waitfor.exe PID 1492 wrote to memory of 1320 1492 cmd.exe attrib.exe PID 1492 wrote to memory of 1320 1492 cmd.exe attrib.exe PID 1492 wrote to memory of 1320 1492 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1320 attrib.exe 1712 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe"C:\Users\Admin\AppData\Local\Temp\e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Roaming\PowerLicensing\StudioC:\Users\Admin\AppData\Roaming\PowerLicensing\Studio /go2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\system32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Roaming\PowerLicensing\Studio" & del "C:\Users\Admin\AppData\Roaming\PowerLicensing\Studio" & rd "C:\Users\Admin\AppData\Roaming\PowerLicensing\"3⤵
- Suspicious use of WriteProcessMemory
PID:1648
-
-
-
C:\Windows\system32\cmd.execmd /c waitfor /t 10 pause /d y & attrib -h "C:\Users\Admin\AppData\Local\Temp\e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe" & del "C:\Users\Admin\AppData\Local\Temp\e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe" & rd "C:\Users\Admin\AppData\Local\Temp\"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1492
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Local\Temp\e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0.exe"1⤵
- Views/modifies file attributes
PID:1320
-
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y1⤵PID:912
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\PowerLicensing\Studio"1⤵
- Views/modifies file attributes
PID:1712
-
C:\Windows\system32\waitfor.exewaitfor /t 10 pause /d y1⤵PID:1084
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ab99a5767c1d598c49b1f5d615a76302
SHA1b4061d4227e08cfaa3190dea9926571fca2736a1
SHA256e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0
SHA512f12db9f7bfaa22747cc38a10a317bd6c7af483f9275f5981186d74435dda80df6faf53d10ee47c63b4b213310d29ca0eef5966983ecaa0dd7463a50c62cfab0c
-
Filesize
1.8MB
MD5ab99a5767c1d598c49b1f5d615a76302
SHA1b4061d4227e08cfaa3190dea9926571fca2736a1
SHA256e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0
SHA512f12db9f7bfaa22747cc38a10a317bd6c7af483f9275f5981186d74435dda80df6faf53d10ee47c63b4b213310d29ca0eef5966983ecaa0dd7463a50c62cfab0c
-
Filesize
1.8MB
MD5ab99a5767c1d598c49b1f5d615a76302
SHA1b4061d4227e08cfaa3190dea9926571fca2736a1
SHA256e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0
SHA512f12db9f7bfaa22747cc38a10a317bd6c7af483f9275f5981186d74435dda80df6faf53d10ee47c63b4b213310d29ca0eef5966983ecaa0dd7463a50c62cfab0c
-
Filesize
1.8MB
MD5ab99a5767c1d598c49b1f5d615a76302
SHA1b4061d4227e08cfaa3190dea9926571fca2736a1
SHA256e657ff4838e474653b55367aa9d4a0641b35378e2e379ad0fdd1631b3b763ef0
SHA512f12db9f7bfaa22747cc38a10a317bd6c7af483f9275f5981186d74435dda80df6faf53d10ee47c63b4b213310d29ca0eef5966983ecaa0dd7463a50c62cfab0c