Analysis
-
max time kernel
57s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 18:06
Static task
static1
Behavioral task
behavioral1
Sample
PHOTO-DEVOCHKA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PHOTO-DEVOCHKA.exe
Resource
win10v2004-20220812-en
General
-
Target
PHOTO-DEVOCHKA.exe
-
Size
149KB
-
MD5
e9fd8bdc0bde7fcfe125365a38eea21b
-
SHA1
ef854a798f094d378dbcbb8fc9c6875dc6b9390b
-
SHA256
bcf7de87a7e8e1febba170298c2584377879146cb8f89d36f152c7ff96246f5f
-
SHA512
32f4993b48436d6ee6d5c0f427fe83bbca5df270804450326a74e518fa7f0b88b22a4ff06c32cf94bb1fa70709ded787a87ce10f6cef9f1a82c858427ba017a4
-
SSDEEP
3072:lBAp5XhKpN4eOyVTGfhEClj8jTk+0hiHoaPXWH8:AbXE9OiTGfhEClq9aaPWH8
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1844 WScript.exe 5 1844 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\NewProduct\al99999.pp PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\al99999.vbs cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\all2.vbs PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\koollapsa.bat PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\slonik.po PHOTO-DEVOCHKA.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe PHOTO-DEVOCHKA.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini PHOTO-DEVOCHKA.exe File created C:\Program Files (x86)\Company\NewProduct\al99999.vbs cmd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\hhhh.txt PHOTO-DEVOCHKA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 112 wrote to memory of 948 112 PHOTO-DEVOCHKA.exe 28 PID 112 wrote to memory of 948 112 PHOTO-DEVOCHKA.exe 28 PID 112 wrote to memory of 948 112 PHOTO-DEVOCHKA.exe 28 PID 112 wrote to memory of 948 112 PHOTO-DEVOCHKA.exe 28 PID 948 wrote to memory of 1844 948 cmd.exe 30 PID 948 wrote to memory of 1844 948 cmd.exe 30 PID 948 wrote to memory of 1844 948 cmd.exe 30 PID 948 wrote to memory of 1844 948 cmd.exe 30 PID 112 wrote to memory of 1988 112 PHOTO-DEVOCHKA.exe 31 PID 112 wrote to memory of 1988 112 PHOTO-DEVOCHKA.exe 31 PID 112 wrote to memory of 1988 112 PHOTO-DEVOCHKA.exe 31 PID 112 wrote to memory of 1988 112 PHOTO-DEVOCHKA.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\PHOTO-DEVOCHKA.exe"C:\Users\Admin\AppData\Local\Temp\PHOTO-DEVOCHKA.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Company\NewProduct\koollapsa.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\al99999.vbs"3⤵
- Blocklisted process makes network request
PID:1844
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Company\NewProduct\all2.vbs"2⤵
- Drops file in Drivers directory
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258B
MD54f13c561e8c1a666e912afefd7cf758d
SHA19cfd5e512bbc2be7ed670f85a731d97a83c71077
SHA256ebb4b61362f29913fab27388fbd70963155333eee1cb4e94110730c82d4eab40
SHA512e7395661df1e81db2575900162112020dd5b6e82debb1e9c419c4399bab92d1ddbb50d0f33f9df54716c7c9398e86013cdfac82f4c2ed0e7e756f068679f3d54
-
Filesize
258B
MD54f13c561e8c1a666e912afefd7cf758d
SHA19cfd5e512bbc2be7ed670f85a731d97a83c71077
SHA256ebb4b61362f29913fab27388fbd70963155333eee1cb4e94110730c82d4eab40
SHA512e7395661df1e81db2575900162112020dd5b6e82debb1e9c419c4399bab92d1ddbb50d0f33f9df54716c7c9398e86013cdfac82f4c2ed0e7e756f068679f3d54
-
Filesize
703B
MD52d6ea08436f0586e48170422bab7c38a
SHA137c85b8e2fa65881ee79703fc24ef6116d0e9ad1
SHA256a119e8db9020bc3e9a540dae375bfb2ab3b136714544d6d765f7dc9c31448dce
SHA512e00428d180204fc258c137fcb8b65226ed3eda7f3f488f8194a1b58f0babc2b9e0d694492e376f819eaca70c79f09925ee86f26307e32f10924693e4bab33a01
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
2KB
MD572aa207e9713c3869aab3ee8d4d16813
SHA16276deeebee93166a2f075ead56cb8532a378d7e
SHA256474a48dcca705150ee9342fc8a076f4ec684d1e50240f5b0c7823500e622240f
SHA512e2697f2effd036a7c24f57c957118b98eb6797be356ee34739e655ed0dfe4d637fc68e288e8c146f2f03af3adfda50d8a57ae44666fa5fe8034d3b3e3c064192
-
Filesize
55B
MD5eebc9086a079af7f6d895c462a250982
SHA1413f00b078361100962d5b048eee0f3c86c27fcd
SHA256761b89d1fd5256fb7bf7fd12ad675776de419ad419c1e5e211ad4784eff80d44
SHA512bfa9e27ea406a7f101badb7e65fb9ffa2ead70d8ef217206184c49385160f7536ae745b66e00e3ee4f549876b689c787c8857614e93b6e096c5ef25d4e68e801
-
Filesize
1KB
MD50021c993f6e270022b22a1f77f6797c1
SHA18f0081a7735307c166ec3a995716dd5306723410
SHA25647195bd86b55e24282ce44af1889353c2ec9aafe4897757759ec05d263fa5dad
SHA512d65404624973d9e2fa8a16511ad0a1ab5a0f232a6ba74e84f69e3443496ea6a580f538cbcd7f160993315b4cfa40897dc548d70ff61f01a0b81a1437e09b5fd6