Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-09-2022 11:15
Static task
static1
Behavioral task
behavioral1
Sample
7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe
Resource
win10v2004-20220812-en
General
-
Target
7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe
-
Size
8.5MB
-
MD5
3ca11cf521167682217f50f518042dd4
-
SHA1
a05b8c003d0055cf518bf9d1a1c2834b71510342
-
SHA256
7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3
-
SHA512
efb2af073de82f701bf0017e036371dfab9109a8a290e62a3ed1961a7e59f2bd673bbe0bbce2d722bc6448069318bafec2701fc442aea0e439e4e57765c4bd81
-
SSDEEP
196608:G7PkOJxfcwTDFHX7dvTjEOvfr9mIVbYQLiTItv3mCN3D34:8PkexEsHhvsOvf8aYQdv3mCFo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2004 PPTVIEW.EXE -
Loads dropped DLL 4 IoCs
pid Process 1448 cmd.exe 2004 PPTVIEW.EXE 2004 PPTVIEW.EXE 2004 PPTVIEW.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1448 1372 7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe 28 PID 1372 wrote to memory of 1448 1372 7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe 28 PID 1372 wrote to memory of 1448 1372 7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe 28 PID 1372 wrote to memory of 1448 1372 7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe 28 PID 1372 wrote to memory of 1448 1372 7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe 28 PID 1372 wrote to memory of 1448 1372 7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe 28 PID 1372 wrote to memory of 1448 1372 7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe 28 PID 1448 wrote to memory of 2004 1448 cmd.exe 30 PID 1448 wrote to memory of 2004 1448 cmd.exe 30 PID 1448 wrote to memory of 2004 1448 cmd.exe 30 PID 1448 wrote to memory of 2004 1448 cmd.exe 30 PID 1448 wrote to memory of 2004 1448 cmd.exe 30 PID 1448 wrote to memory of 2004 1448 cmd.exe 30 PID 1448 wrote to memory of 2004 1448 cmd.exe 30 PID 1448 wrote to memory of 2004 1448 cmd.exe 30 PID 1448 wrote to memory of 2004 1448 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe"C:\Users\Admin\AppData\Local\Temp\7323d25208f99cbbe9cca8da4187a119d7ed9be500968b7a7f16b5dc5885d0c3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\play.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\PPTVIEW.EXEPPTVIEW.EXE /L "playlist.txt"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5c6a24d8fefba44ecae8d2f02e18866be
SHA1faea579ccee92c2fb780d06a5faed9a58869f49d
SHA256fcdfa4ca411b2c7492ae9be2c1fa8660b8e832d1ed0ceb54cfc423a3f73c5467
SHA51281bf32782e33f18e8faebedbe6640b6a22e04977a7191a104bfed832f9bae5d96f9c5c2aacf1fad0561a09359a5712b7c99aa8e17f54437bd49794c903823676
-
Filesize
1.9MB
MD5c6a24d8fefba44ecae8d2f02e18866be
SHA1faea579ccee92c2fb780d06a5faed9a58869f49d
SHA256fcdfa4ca411b2c7492ae9be2c1fa8660b8e832d1ed0ceb54cfc423a3f73c5467
SHA51281bf32782e33f18e8faebedbe6640b6a22e04977a7191a104bfed832f9bae5d96f9c5c2aacf1fad0561a09359a5712b7c99aa8e17f54437bd49794c903823676
-
Filesize
1.6MB
MD5771e968f072bdcc1a84870002e315842
SHA10d4a47eb49a8dcd3a7864de148d98162f7a25445
SHA256f2f083548ff28ead2573516afe67b1e0a181270c814f318cf4d403cdd954de91
SHA512fc3e4e9dec36bce356d1978419beabfd1e51fe199779798192d6b594baf9e60c3fb1f2289dd583f0c0d1724e2aaff619a85f69dab773c7f6004da72eefbcb1e2
-
Filesize
30B
MD5b7d94018ad8a49b0cf2fd7a9cdef943e
SHA167741ee33c4830aeeb8138a05ee33d32539ec2c7
SHA25630c9405432c25f615f893e2a7a86589631415d17eb88439e3532d24dda988948
SHA5129950e32944e359c3874bfd8f899880fc7a6d508655a6ee26d315daec64d227ca7b1df91ba396fb2fe401f7cfb5d669ae8fb4ed8946f857b0f3a93e0de9827cf6
-
Filesize
319KB
MD59a60a0ad72a65a7511cf5cbc4fd1c3f7
SHA1711abefcb5db45428a74b16d632ac1335c18c6b3
SHA25618e44e82da94537a45ffeb5b9c9085082a40d9e2d660e8e5bd78d9a87b6245c2
SHA51201d32823cee5daf869aa4389f7940533eef1c7b943af2e2d44f2f261b54eb879edf52746e1973b099471a6320e1d1a3ba81e2301279c230aa188fb164ad6ca32
-
Filesize
1.6MB
MD5771e968f072bdcc1a84870002e315842
SHA10d4a47eb49a8dcd3a7864de148d98162f7a25445
SHA256f2f083548ff28ead2573516afe67b1e0a181270c814f318cf4d403cdd954de91
SHA512fc3e4e9dec36bce356d1978419beabfd1e51fe199779798192d6b594baf9e60c3fb1f2289dd583f0c0d1724e2aaff619a85f69dab773c7f6004da72eefbcb1e2
-
Filesize
1.9MB
MD5c6a24d8fefba44ecae8d2f02e18866be
SHA1faea579ccee92c2fb780d06a5faed9a58869f49d
SHA256fcdfa4ca411b2c7492ae9be2c1fa8660b8e832d1ed0ceb54cfc423a3f73c5467
SHA51281bf32782e33f18e8faebedbe6640b6a22e04977a7191a104bfed832f9bae5d96f9c5c2aacf1fad0561a09359a5712b7c99aa8e17f54437bd49794c903823676
-
Filesize
1.9MB
MD5c6a24d8fefba44ecae8d2f02e18866be
SHA1faea579ccee92c2fb780d06a5faed9a58869f49d
SHA256fcdfa4ca411b2c7492ae9be2c1fa8660b8e832d1ed0ceb54cfc423a3f73c5467
SHA51281bf32782e33f18e8faebedbe6640b6a22e04977a7191a104bfed832f9bae5d96f9c5c2aacf1fad0561a09359a5712b7c99aa8e17f54437bd49794c903823676
-
Filesize
319KB
MD59a60a0ad72a65a7511cf5cbc4fd1c3f7
SHA1711abefcb5db45428a74b16d632ac1335c18c6b3
SHA25618e44e82da94537a45ffeb5b9c9085082a40d9e2d660e8e5bd78d9a87b6245c2
SHA51201d32823cee5daf869aa4389f7940533eef1c7b943af2e2d44f2f261b54eb879edf52746e1973b099471a6320e1d1a3ba81e2301279c230aa188fb164ad6ca32