Analysis
-
max time kernel
64s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 18:32
Static task
static1
Behavioral task
behavioral1
Sample
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe
Resource
win10v2004-20220718-en
General
-
Target
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe
-
Size
255KB
-
MD5
f69d0c44228292018482c40f6f7fb235
-
SHA1
bd7e27f6fdd7000c1ae16040b44755b5705ee6f0
-
SHA256
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6
-
SHA512
c0a04574479861421b260a5a2078022dc9b8aa2aa58538f95bd48f25856d769f32799f45884c52a036e207f243e835d621e3474649c1706df14fc39995737d72
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exepid process 1680 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe 1680 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe 1680 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe -
Drops file in Windows directory 1 IoCs
Processes:
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exedescription ioc process File opened for modification C:\Windows\win.ini 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1056 1680 WerFault.exe 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe -
Modifies registry class 5 IoCs
Processes:
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32\ThreadingModel = "Apartment" 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B} 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exedescription pid process target process PID 1680 wrote to memory of 1056 1680 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe WerFault.exe PID 1680 wrote to memory of 1056 1680 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe WerFault.exe PID 1680 wrote to memory of 1056 1680 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe WerFault.exe PID 1680 wrote to memory of 1056 1680 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe"C:\Users\Admin\AppData\Local\Temp\4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 5082⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\deceased.dllFilesize
24KB
MD54739ba192a560d12b81e915e1620d51f
SHA175fc507eab36a4232fca404b9f2451d3b2731432
SHA25614210af8f444ed393be2b22edc2eb9c74188f095c920b4f303db585934bceade
SHA512a8ab3190ea15f5e2fd9c53bcb261b88473a14c02f3a4cb37d1e99a431deafa7555e332a78a8d932f098c7453fc41bf66a6dde16c22bbf89591c9b2b91b5cfc21
-
\Users\Admin\AppData\Local\Temp\nsj2CFC.tmp\System.dllFilesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
\Users\Admin\AppData\Local\Temp\nsj2CFC.tmp\UserInfo.dllFilesize
4KB
MD57836f464ae0102452e94a363b491b759
SHA159909a48448b99e2eb9cd336d81d60764da59f31
SHA25611adf8916947b5a20a071b494fa034cf62769dcc6293a1340b29a5bb29ac8e87
SHA5125ed63eefa1b3b3caad4cb762ccb8419c05bcad3da3a7415235cda2d2a1f79eb018503ca30a0a92d6b72160327decea9a70c48e0c28de94dd67303d4aea4a02db
-
memory/1056-64-0x0000000000000000-mapping.dmp
-
memory/1680-54-0x0000000075E21000-0x0000000075E23000-memory.dmpFilesize
8KB
-
memory/1680-58-0x0000000000510000-0x0000000000518000-memory.dmpFilesize
32KB
-
memory/1680-65-0x0000000002350000-0x0000000002F9A000-memory.dmpFilesize
12.3MB
-
memory/1680-66-0x0000000002350000-0x0000000002F9A000-memory.dmpFilesize
12.3MB