Analysis
-
max time kernel
129s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe
Resource
win10v2004-20220812-en
General
-
Target
bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe
-
Size
67KB
-
MD5
b7e5d97a60fec2db9a30bfb46dca307d
-
SHA1
c8d9578aca4a4bb528eb8280ae64df5c4b3408ce
-
SHA256
bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651
-
SHA512
ee98d4c74c1a6384f7b08692958fd6285834ba5693635106da407751af309263924217320138e84363b1747ededa33f97bdb4330824beb19661a20bf8e781f81
-
SSDEEP
1536:nn8YjGFzGwPwTFgc0GKf6xzpGG6vKRgau2Cnd3YehTuXAxUva:nnDjXwPwZFLxzp9u5nZYBAxCa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4116 notepad.exe -
Loads dropped DLL 1 IoCs
pid Process 1156 rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\notepad.exe bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe File opened for modification C:\Program Files (x86)\Common Files\notepad.exe bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1204 1156 WerFault.exe 81 -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4116 notepad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4116 4056 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 80 PID 4056 wrote to memory of 4116 4056 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 80 PID 4056 wrote to memory of 4116 4056 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 80 PID 4116 wrote to memory of 1156 4116 notepad.exe 81 PID 4116 wrote to memory of 1156 4116 notepad.exe 81 PID 4116 wrote to memory of 1156 4116 notepad.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe"C:\Users\Admin\AppData\Local\Temp\bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Program Files (x86)\Common Files\notepad.exe"C:\Program Files (x86)\Common Files\notepad.exe" C:\Users\Admin\AppData\Local\Temp\bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe2⤵
- Executes dropped EXE
- Opens file in notepad (likely ransom note)
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\CEFD.tmp" "8A'+ [=[SCMR'8[='U"3⤵
- Loads dropped DLL
PID:1156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 6084⤵
- Program crash
PID:1204
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1156 -ip 11561⤵PID:4460
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5b7e5d97a60fec2db9a30bfb46dca307d
SHA1c8d9578aca4a4bb528eb8280ae64df5c4b3408ce
SHA256bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651
SHA512ee98d4c74c1a6384f7b08692958fd6285834ba5693635106da407751af309263924217320138e84363b1747ededa33f97bdb4330824beb19661a20bf8e781f81
-
Filesize
67KB
MD5b7e5d97a60fec2db9a30bfb46dca307d
SHA1c8d9578aca4a4bb528eb8280ae64df5c4b3408ce
SHA256bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651
SHA512ee98d4c74c1a6384f7b08692958fd6285834ba5693635106da407751af309263924217320138e84363b1747ededa33f97bdb4330824beb19661a20bf8e781f81
-
Filesize
98KB
MD5fa691bbacc13fc8e58960ef2d5dbe63e
SHA148f03e288c3891c9e30b3d936074ae4b235b5137
SHA256e9426c7cca5c1726c72a10681b4c272d614788275237e4e90d19ba211932c86f
SHA512d4d6650e39cbd9a699cc7adadd87b40da6e6d750a8576d2b083a244a94392561471f337b2ce492eb3764866f5fe7ded87e4da8cb1c1c6f8685d6a9020f272d34
-
Filesize
98KB
MD5fa691bbacc13fc8e58960ef2d5dbe63e
SHA148f03e288c3891c9e30b3d936074ae4b235b5137
SHA256e9426c7cca5c1726c72a10681b4c272d614788275237e4e90d19ba211932c86f
SHA512d4d6650e39cbd9a699cc7adadd87b40da6e6d750a8576d2b083a244a94392561471f337b2ce492eb3764866f5fe7ded87e4da8cb1c1c6f8685d6a9020f272d34