Analysis
-
max time kernel
152s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-09-2022 21:32
Behavioral task
behavioral1
Sample
af4067531a9b76905a2961548729b46f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af4067531a9b76905a2961548729b46f.exe
Resource
win10v2004-20220901-en
General
-
Target
af4067531a9b76905a2961548729b46f.exe
-
Size
69KB
-
MD5
af4067531a9b76905a2961548729b46f
-
SHA1
f4e0a6f82d1508512b2714668cd729025cebce5a
-
SHA256
aa6fdea0adf914c28d318110ce5eb7cf3a0660a6fdbcdb78af2e34be669109e0
-
SHA512
fa559087fa627bfe8a7cc3a36ed9d50095dd9d2a6060616f62c8323baf1a43e9c0a1490605da34642c56da21a0749a8c99773aa8b9ef8adfd110decb0bd2e7cb
-
SSDEEP
1536:CZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAwfMqqU+2bbbAV2/S2Lkvd9:kBounVyFHpfMqqDL2/Lkvd
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\uktesazstmv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\af4067531a9b76905a2961548729b46f.exe" af4067531a9b76905a2961548729b46f.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce af4067531a9b76905a2961548729b46f.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\W: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\A: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\E: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\F: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\I: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\P: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\S: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\Y: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\B: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\Q: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\R: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\X: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\H: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\J: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\K: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\N: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\T: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\Z: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\G: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\L: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\M: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\O: af4067531a9b76905a2961548729b46f.exe File opened (read-only) \??\U: af4067531a9b76905a2961548729b46f.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 af4067531a9b76905a2961548729b46f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString af4067531a9b76905a2961548729b46f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier af4067531a9b76905a2961548729b46f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1788 af4067531a9b76905a2961548729b46f.exe 1788 af4067531a9b76905a2961548729b46f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2036 1788 af4067531a9b76905a2961548729b46f.exe 30 PID 1788 wrote to memory of 2036 1788 af4067531a9b76905a2961548729b46f.exe 30 PID 1788 wrote to memory of 2036 1788 af4067531a9b76905a2961548729b46f.exe 30 PID 1788 wrote to memory of 2036 1788 af4067531a9b76905a2961548729b46f.exe 30 PID 1788 wrote to memory of 316 1788 af4067531a9b76905a2961548729b46f.exe 32 PID 1788 wrote to memory of 316 1788 af4067531a9b76905a2961548729b46f.exe 32 PID 1788 wrote to memory of 316 1788 af4067531a9b76905a2961548729b46f.exe 32 PID 1788 wrote to memory of 316 1788 af4067531a9b76905a2961548729b46f.exe 32 PID 1788 wrote to memory of 1948 1788 af4067531a9b76905a2961548729b46f.exe 34 PID 1788 wrote to memory of 1948 1788 af4067531a9b76905a2961548729b46f.exe 34 PID 1788 wrote to memory of 1948 1788 af4067531a9b76905a2961548729b46f.exe 34 PID 1788 wrote to memory of 1948 1788 af4067531a9b76905a2961548729b46f.exe 34 PID 1788 wrote to memory of 1088 1788 af4067531a9b76905a2961548729b46f.exe 36 PID 1788 wrote to memory of 1088 1788 af4067531a9b76905a2961548729b46f.exe 36 PID 1788 wrote to memory of 1088 1788 af4067531a9b76905a2961548729b46f.exe 36 PID 1788 wrote to memory of 1088 1788 af4067531a9b76905a2961548729b46f.exe 36 PID 1788 wrote to memory of 1520 1788 af4067531a9b76905a2961548729b46f.exe 38 PID 1788 wrote to memory of 1520 1788 af4067531a9b76905a2961548729b46f.exe 38 PID 1788 wrote to memory of 1520 1788 af4067531a9b76905a2961548729b46f.exe 38 PID 1788 wrote to memory of 1520 1788 af4067531a9b76905a2961548729b46f.exe 38 PID 1788 wrote to memory of 672 1788 af4067531a9b76905a2961548729b46f.exe 40 PID 1788 wrote to memory of 672 1788 af4067531a9b76905a2961548729b46f.exe 40 PID 1788 wrote to memory of 672 1788 af4067531a9b76905a2961548729b46f.exe 40 PID 1788 wrote to memory of 672 1788 af4067531a9b76905a2961548729b46f.exe 40 PID 1788 wrote to memory of 1000 1788 af4067531a9b76905a2961548729b46f.exe 42 PID 1788 wrote to memory of 1000 1788 af4067531a9b76905a2961548729b46f.exe 42 PID 1788 wrote to memory of 1000 1788 af4067531a9b76905a2961548729b46f.exe 42 PID 1788 wrote to memory of 1000 1788 af4067531a9b76905a2961548729b46f.exe 42 PID 1788 wrote to memory of 1692 1788 af4067531a9b76905a2961548729b46f.exe 44 PID 1788 wrote to memory of 1692 1788 af4067531a9b76905a2961548729b46f.exe 44 PID 1788 wrote to memory of 1692 1788 af4067531a9b76905a2961548729b46f.exe 44 PID 1788 wrote to memory of 1692 1788 af4067531a9b76905a2961548729b46f.exe 44 PID 1788 wrote to memory of 432 1788 af4067531a9b76905a2961548729b46f.exe 47 PID 1788 wrote to memory of 432 1788 af4067531a9b76905a2961548729b46f.exe 47 PID 1788 wrote to memory of 432 1788 af4067531a9b76905a2961548729b46f.exe 47 PID 1788 wrote to memory of 432 1788 af4067531a9b76905a2961548729b46f.exe 47 PID 1788 wrote to memory of 2012 1788 af4067531a9b76905a2961548729b46f.exe 48 PID 1788 wrote to memory of 2012 1788 af4067531a9b76905a2961548729b46f.exe 48 PID 1788 wrote to memory of 2012 1788 af4067531a9b76905a2961548729b46f.exe 48 PID 1788 wrote to memory of 2012 1788 af4067531a9b76905a2961548729b46f.exe 48 PID 1788 wrote to memory of 1668 1788 af4067531a9b76905a2961548729b46f.exe 50 PID 1788 wrote to memory of 1668 1788 af4067531a9b76905a2961548729b46f.exe 50 PID 1788 wrote to memory of 1668 1788 af4067531a9b76905a2961548729b46f.exe 50 PID 1788 wrote to memory of 1668 1788 af4067531a9b76905a2961548729b46f.exe 50 PID 1788 wrote to memory of 1848 1788 af4067531a9b76905a2961548729b46f.exe 53 PID 1788 wrote to memory of 1848 1788 af4067531a9b76905a2961548729b46f.exe 53 PID 1788 wrote to memory of 1848 1788 af4067531a9b76905a2961548729b46f.exe 53 PID 1788 wrote to memory of 1848 1788 af4067531a9b76905a2961548729b46f.exe 53 PID 1788 wrote to memory of 1160 1788 af4067531a9b76905a2961548729b46f.exe 54 PID 1788 wrote to memory of 1160 1788 af4067531a9b76905a2961548729b46f.exe 54 PID 1788 wrote to memory of 1160 1788 af4067531a9b76905a2961548729b46f.exe 54 PID 1788 wrote to memory of 1160 1788 af4067531a9b76905a2961548729b46f.exe 54 PID 1788 wrote to memory of 1648 1788 af4067531a9b76905a2961548729b46f.exe 56 PID 1788 wrote to memory of 1648 1788 af4067531a9b76905a2961548729b46f.exe 56 PID 1788 wrote to memory of 1648 1788 af4067531a9b76905a2961548729b46f.exe 56 PID 1788 wrote to memory of 1648 1788 af4067531a9b76905a2961548729b46f.exe 56 PID 1788 wrote to memory of 1800 1788 af4067531a9b76905a2961548729b46f.exe 58 PID 1788 wrote to memory of 1800 1788 af4067531a9b76905a2961548729b46f.exe 58 PID 1788 wrote to memory of 1800 1788 af4067531a9b76905a2961548729b46f.exe 58 PID 1788 wrote to memory of 1800 1788 af4067531a9b76905a2961548729b46f.exe 58 PID 1788 wrote to memory of 1620 1788 af4067531a9b76905a2961548729b46f.exe 60 PID 1788 wrote to memory of 1620 1788 af4067531a9b76905a2961548729b46f.exe 60 PID 1788 wrote to memory of 1620 1788 af4067531a9b76905a2961548729b46f.exe 60 PID 1788 wrote to memory of 1620 1788 af4067531a9b76905a2961548729b46f.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\af4067531a9b76905a2961548729b46f.exe"C:\Users\Admin\AppData\Local\Temp\af4067531a9b76905a2961548729b46f.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:2036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:316
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1088
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1520
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:672
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1000
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:432
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:2012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1668
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1848
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1160
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1648
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1800
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1620
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:688
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:560
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1696
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1672
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1504
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1584
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1216
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1904
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1972
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1484
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1652
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1492
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:524
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1172
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1836
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:592
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:2016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1444
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1684
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1400
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1612
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1268
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1180
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:856
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1040
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1028
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:848
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:912
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1932
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1752
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1532
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:568
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:108
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1624
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1760
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1896
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:956
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1796
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1220
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1772
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1128
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1576
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:984
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1968
-