Analysis
-
max time kernel
30s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 03:50
Static task
static1
Behavioral task
behavioral1
Sample
8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe
Resource
win10v2004-20220812-en
General
-
Target
8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe
-
Size
383KB
-
MD5
f933bf16ab327dde3bbd1edf8904ca24
-
SHA1
80fffd5994081d4e448b316313fb6ba02403c449
-
SHA256
8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f
-
SHA512
a3ad122a2eae7e824723a42a153c7e2c4421dd24804ec262f68c66c074a4e548ec2d6fd3c4909493e24fd3cf37ffe55048459199c85ef491a89297254d8678c0
-
SSDEEP
6144:rs84tsv9slNSxY2Nc2EzpTPPy4AbE47WfA8RwpEP4h:rf4tu9slNSq2N7a9LmEjIma
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1456 notepad.exe 1784 calc.exe -
resource yara_rule behavioral1/files/0x000900000001267a-63.dat upx behavioral1/files/0x000900000001267a-64.dat upx behavioral1/files/0x000900000001267a-65.dat upx behavioral1/files/0x000900000001267a-66.dat upx behavioral1/files/0x000900000001267a-70.dat upx behavioral1/files/0x000900000001267a-67.dat upx behavioral1/memory/1784-72-0x0000000001000000-0x0000000001028000-memory.dmp upx -
Loads dropped DLL 10 IoCs
pid Process 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 876 wrote to memory of 1456 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 28 PID 876 wrote to memory of 1456 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 28 PID 876 wrote to memory of 1456 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 28 PID 876 wrote to memory of 1456 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 28 PID 876 wrote to memory of 1784 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 29 PID 876 wrote to memory of 1784 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 29 PID 876 wrote to memory of 1784 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 29 PID 876 wrote to memory of 1784 876 8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe"C:\Users\Admin\AppData\Local\Temp\8ed18a0272266f61bf46450dcc91262732171649239ec138b00e4fa96168314f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\Desktop\notepad.exe"C:\Users\Admin\Desktop\notepad.exe"2⤵
- Executes dropped EXE
PID:1456
-
-
C:\Users\Admin\Desktop\calc.exe"C:\Users\Admin\Desktop\calc.exe"2⤵
- Executes dropped EXE
PID:1784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5e600b4d8d232484f43d7942a475b5709
SHA1c053b63428fd9618593691b8e9c2f5a885631ece
SHA256a3a7c8b877e44904cc3855802cee5432f0b1ea53dc37ef9d5d9ef63e06b9f187
SHA512d16a039682385200b9b0a53e1b9a13f619a33b3e6e7d3fab5c8040daf541ee464219b750f47f5c77496d386f2b359e6a8b776ab2ee295cc1e42fd8c788115be7
-
Filesize
69KB
MD58aec89c7cc076ed378baa4dab7cb09e2
SHA1caf84e588017a7098561a62e291dfa1a4f01db73
SHA256f605009a245a5a1b6351f980f6d7d409e521dd33c1a528c4241d32b09a79fd10
SHA512a7abb018d1d039e74ae846c36f5fb3e1a68a1a224387c386f86bc7770318c3478c26ef1779fe30e56654bfee4f271663bac29a22c06e7fc77c8c85a37f6886cb
-
Filesize
56KB
MD5e600b4d8d232484f43d7942a475b5709
SHA1c053b63428fd9618593691b8e9c2f5a885631ece
SHA256a3a7c8b877e44904cc3855802cee5432f0b1ea53dc37ef9d5d9ef63e06b9f187
SHA512d16a039682385200b9b0a53e1b9a13f619a33b3e6e7d3fab5c8040daf541ee464219b750f47f5c77496d386f2b359e6a8b776ab2ee295cc1e42fd8c788115be7
-
Filesize
56KB
MD5e600b4d8d232484f43d7942a475b5709
SHA1c053b63428fd9618593691b8e9c2f5a885631ece
SHA256a3a7c8b877e44904cc3855802cee5432f0b1ea53dc37ef9d5d9ef63e06b9f187
SHA512d16a039682385200b9b0a53e1b9a13f619a33b3e6e7d3fab5c8040daf541ee464219b750f47f5c77496d386f2b359e6a8b776ab2ee295cc1e42fd8c788115be7
-
Filesize
56KB
MD5e600b4d8d232484f43d7942a475b5709
SHA1c053b63428fd9618593691b8e9c2f5a885631ece
SHA256a3a7c8b877e44904cc3855802cee5432f0b1ea53dc37ef9d5d9ef63e06b9f187
SHA512d16a039682385200b9b0a53e1b9a13f619a33b3e6e7d3fab5c8040daf541ee464219b750f47f5c77496d386f2b359e6a8b776ab2ee295cc1e42fd8c788115be7
-
Filesize
56KB
MD5e600b4d8d232484f43d7942a475b5709
SHA1c053b63428fd9618593691b8e9c2f5a885631ece
SHA256a3a7c8b877e44904cc3855802cee5432f0b1ea53dc37ef9d5d9ef63e06b9f187
SHA512d16a039682385200b9b0a53e1b9a13f619a33b3e6e7d3fab5c8040daf541ee464219b750f47f5c77496d386f2b359e6a8b776ab2ee295cc1e42fd8c788115be7
-
Filesize
56KB
MD5e600b4d8d232484f43d7942a475b5709
SHA1c053b63428fd9618593691b8e9c2f5a885631ece
SHA256a3a7c8b877e44904cc3855802cee5432f0b1ea53dc37ef9d5d9ef63e06b9f187
SHA512d16a039682385200b9b0a53e1b9a13f619a33b3e6e7d3fab5c8040daf541ee464219b750f47f5c77496d386f2b359e6a8b776ab2ee295cc1e42fd8c788115be7
-
Filesize
69KB
MD58aec89c7cc076ed378baa4dab7cb09e2
SHA1caf84e588017a7098561a62e291dfa1a4f01db73
SHA256f605009a245a5a1b6351f980f6d7d409e521dd33c1a528c4241d32b09a79fd10
SHA512a7abb018d1d039e74ae846c36f5fb3e1a68a1a224387c386f86bc7770318c3478c26ef1779fe30e56654bfee4f271663bac29a22c06e7fc77c8c85a37f6886cb
-
Filesize
69KB
MD58aec89c7cc076ed378baa4dab7cb09e2
SHA1caf84e588017a7098561a62e291dfa1a4f01db73
SHA256f605009a245a5a1b6351f980f6d7d409e521dd33c1a528c4241d32b09a79fd10
SHA512a7abb018d1d039e74ae846c36f5fb3e1a68a1a224387c386f86bc7770318c3478c26ef1779fe30e56654bfee4f271663bac29a22c06e7fc77c8c85a37f6886cb
-
Filesize
69KB
MD58aec89c7cc076ed378baa4dab7cb09e2
SHA1caf84e588017a7098561a62e291dfa1a4f01db73
SHA256f605009a245a5a1b6351f980f6d7d409e521dd33c1a528c4241d32b09a79fd10
SHA512a7abb018d1d039e74ae846c36f5fb3e1a68a1a224387c386f86bc7770318c3478c26ef1779fe30e56654bfee4f271663bac29a22c06e7fc77c8c85a37f6886cb
-
Filesize
69KB
MD58aec89c7cc076ed378baa4dab7cb09e2
SHA1caf84e588017a7098561a62e291dfa1a4f01db73
SHA256f605009a245a5a1b6351f980f6d7d409e521dd33c1a528c4241d32b09a79fd10
SHA512a7abb018d1d039e74ae846c36f5fb3e1a68a1a224387c386f86bc7770318c3478c26ef1779fe30e56654bfee4f271663bac29a22c06e7fc77c8c85a37f6886cb
-
Filesize
69KB
MD58aec89c7cc076ed378baa4dab7cb09e2
SHA1caf84e588017a7098561a62e291dfa1a4f01db73
SHA256f605009a245a5a1b6351f980f6d7d409e521dd33c1a528c4241d32b09a79fd10
SHA512a7abb018d1d039e74ae846c36f5fb3e1a68a1a224387c386f86bc7770318c3478c26ef1779fe30e56654bfee4f271663bac29a22c06e7fc77c8c85a37f6886cb