Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/09/2022, 17:06
Behavioral task
behavioral1
Sample
7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe
Resource
win10v2004-20220812-en
General
-
Target
7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe
-
Size
3.8MB
-
MD5
676a92114b72e7fc72c93a96b90d81c2
-
SHA1
bcabe2e90fe65b3dcd4cf84209b111c138515661
-
SHA256
7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c
-
SHA512
cc7cf5bc731933d950af2ad2fc03d37d42ba9ad4b5e114403757711342544fcf367fad39aae7bc6d30d78b6d4ce8cbbdc47ad24b75b0d87bddac8963a0750992
-
SSDEEP
98304:nc6BlK3SyXkOt5ug0z4fBQqeex3ys6OeiYyKb2bMx98bhRA:ZcSyUObp0UfBQq93iZy62o8brA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1484 RegDllSetup.exe -
resource yara_rule behavioral1/memory/1648-55-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral1/memory/1648-59-0x0000000000400000-0x0000000000438000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1648 7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1484 1648 7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe 28 PID 1648 wrote to memory of 1484 1648 7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe 28 PID 1648 wrote to memory of 1484 1648 7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe 28 PID 1648 wrote to memory of 1484 1648 7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe 28 PID 1648 wrote to memory of 1484 1648 7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe 28 PID 1648 wrote to memory of 1484 1648 7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe 28 PID 1648 wrote to memory of 1484 1648 7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe"C:\Users\Admin\AppData\Local\Temp\7f4789c6b3be0714ce1bffe070ecc313e8f66bcac2b3cacc0b14ff5714daa29c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Prog\FastCopy\RegDllSetup.exe"C:\Prog\FastCopy\RegDllSetup.exe"2⤵
- Executes dropped EXE
PID:1484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
705KB
MD5290fe4268b15267d42ba4713b872464d
SHA1a6c09875dddbedba3d2d901572cc6a7295747e11
SHA2566582d67e84ca938df9d48c8780c654a1212e4fb2286482c074834e7654bbed6b
SHA51247f22713d039a22edcb91277be3f79440ad984b9a5369055f607d71fa920d29e8eeca03dcc1d8e5b123fd6b891936c12686657415384dc76e1a53da376a59ccb
-
Filesize
705KB
MD5290fe4268b15267d42ba4713b872464d
SHA1a6c09875dddbedba3d2d901572cc6a7295747e11
SHA2566582d67e84ca938df9d48c8780c654a1212e4fb2286482c074834e7654bbed6b
SHA51247f22713d039a22edcb91277be3f79440ad984b9a5369055f607d71fa920d29e8eeca03dcc1d8e5b123fd6b891936c12686657415384dc76e1a53da376a59ccb