Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe
Resource
win10v2004-20220901-en
General
-
Target
eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe
-
Size
35KB
-
MD5
c5a6861990530ac6c4a85cf0d664c2ce
-
SHA1
2b76db81b76a1e12c437a0654c38c3bcc769054f
-
SHA256
eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef
-
SHA512
1471103d87346e9eea7bebb3be685ae6980fa4c2dd14a3a72d4d916d9fccffa5903e0fe66ddc3006272ce718d5a54f0272083fd561c50df91d3f00434e2e754c
-
SSDEEP
384:uTgmkYQJ89BqD+H1Apn2tz7XFLsti35MXWTIqB0A+xWbosx97MSAl3AFj8YczMsu:uGJnTt2BVsfIt2ofPEuuMMZSoAsdXBBw
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1816 set thread context of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\7jOLGxL.com eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe File opened for modification C:\Windows\Fonts\7jOLGxL.com eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2960 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 2960 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1816 wrote to memory of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84 PID 1816 wrote to memory of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84 PID 1816 wrote to memory of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84 PID 1816 wrote to memory of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84 PID 1816 wrote to memory of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84 PID 1816 wrote to memory of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84 PID 1816 wrote to memory of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84 PID 1816 wrote to memory of 2960 1816 eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe"C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe"C:\Users\Admin\AppData\Local\Temp\eaf9c4843e30f663da96a0a1217267a14faac56441962e00c9df348cd399c5ef.exe"2⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4940