Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-09-2022 05:40
Static task
static1
Behavioral task
behavioral1
Sample
5986aff76e7813045b1b130efbb10d30.exe
Resource
win7-20220812-en
General
-
Target
5986aff76e7813045b1b130efbb10d30.exe
-
Size
1.9MB
-
MD5
5986aff76e7813045b1b130efbb10d30
-
SHA1
62b1f733fe7ed0c0230c20dae3c4a65ecb28e180
-
SHA256
7dd44d3b3df4f14474d20ffa23e2fb20dcf22ed3a1458b345a1bd85563ac4a62
-
SHA512
bfa2cad2bbbb61af7dbd22818db048ddaf68e2e22d1c55d80450a7a0c4c31c09bf596f04ebc2a7f55ac70c294ae01d3e8987af4d0bbb60c63662d21c008b3115
-
SSDEEP
24576:ytmVBxgdQncWHOY7XgOxv5zM44Q84u7cpS/G6bLZLI6FMPNK/bAkA/lDA:Jjou3H/Dxxr40uIB6bO6mYPAS
Malware Config
Extracted
systembc
89.22.225.242:4193
195.2.93.22:4193
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
DllResource.exepid process 1588 DllResource.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1284 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
5986aff76e7813045b1b130efbb10d30.exepid process 1960 5986aff76e7813045b1b130efbb10d30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
5986aff76e7813045b1b130efbb10d30.exeDllResource.exepid process 1960 5986aff76e7813045b1b130efbb10d30.exe 1960 5986aff76e7813045b1b130efbb10d30.exe 1960 5986aff76e7813045b1b130efbb10d30.exe 1960 5986aff76e7813045b1b130efbb10d30.exe 1960 5986aff76e7813045b1b130efbb10d30.exe 1588 DllResource.exe 1588 DllResource.exe 1588 DllResource.exe 1588 DllResource.exe 1588 DllResource.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
5986aff76e7813045b1b130efbb10d30.execmd.exedescription pid process target process PID 1960 wrote to memory of 848 1960 5986aff76e7813045b1b130efbb10d30.exe schtasks.exe PID 1960 wrote to memory of 848 1960 5986aff76e7813045b1b130efbb10d30.exe schtasks.exe PID 1960 wrote to memory of 848 1960 5986aff76e7813045b1b130efbb10d30.exe schtasks.exe PID 1960 wrote to memory of 848 1960 5986aff76e7813045b1b130efbb10d30.exe schtasks.exe PID 1960 wrote to memory of 1588 1960 5986aff76e7813045b1b130efbb10d30.exe DllResource.exe PID 1960 wrote to memory of 1588 1960 5986aff76e7813045b1b130efbb10d30.exe DllResource.exe PID 1960 wrote to memory of 1588 1960 5986aff76e7813045b1b130efbb10d30.exe DllResource.exe PID 1960 wrote to memory of 1588 1960 5986aff76e7813045b1b130efbb10d30.exe DllResource.exe PID 1960 wrote to memory of 1284 1960 5986aff76e7813045b1b130efbb10d30.exe cmd.exe PID 1960 wrote to memory of 1284 1960 5986aff76e7813045b1b130efbb10d30.exe cmd.exe PID 1960 wrote to memory of 1284 1960 5986aff76e7813045b1b130efbb10d30.exe cmd.exe PID 1960 wrote to memory of 1284 1960 5986aff76e7813045b1b130efbb10d30.exe cmd.exe PID 1284 wrote to memory of 904 1284 cmd.exe chcp.com PID 1284 wrote to memory of 904 1284 cmd.exe chcp.com PID 1284 wrote to memory of 904 1284 cmd.exe chcp.com PID 1284 wrote to memory of 904 1284 cmd.exe chcp.com PID 1284 wrote to memory of 1340 1284 cmd.exe PING.EXE PID 1284 wrote to memory of 1340 1284 cmd.exe PING.EXE PID 1284 wrote to memory of 1340 1284 cmd.exe PING.EXE PID 1284 wrote to memory of 1340 1284 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5986aff76e7813045b1b130efbb10d30.exe"C:\Users\Admin\AppData\Local\Temp\5986aff76e7813045b1b130efbb10d30.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\TypeRes\DllResource.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\TypeRes\DllResource.exe"C:\Users\Admin\TypeRes\DllResource.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\5986aff76e7813045b1b130efbb10d30.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\TypeRes\DllResource.exeFilesize
437.8MB
MD503aabded8a64f014b4306f8d96d9692a
SHA1e645a2a3c9761d6637de8c5e826967876584101b
SHA25679fc67af8209250fe7ee4d2c73715b02211485bde17c5afea21451380c29dc55
SHA512f99e96fdf513575a6a5375ecb32dd0684df8a1746aa56718cc55c7140fd83357b555f10801dcd679278d3bde487847d2435a32a7223958f2f3808253e467f676
-
\Users\Admin\TypeRes\DllResource.exeFilesize
443.4MB
MD5d172ae8074e65ae65a235e578cf2598a
SHA1a094844f9ca02fdec550c3d44b1e760c9140f58b
SHA256f44fc66bb23c7a65ba28090f3c99ffdc5f6f6b16c1279b57d3be14d8203a3a44
SHA5124e016cdc56cb5bac509366c65f8639b4cc9d0859f842465c627492b7fccb88ef1e9b1fa5ebc1e59772d5f058cb60ead7d9f9a409033271b32b0e8cafe971b2a8
-
memory/848-61-0x0000000000000000-mapping.dmp
-
memory/904-67-0x0000000000000000-mapping.dmp
-
memory/1284-65-0x0000000000000000-mapping.dmp
-
memory/1340-68-0x0000000000000000-mapping.dmp
-
memory/1588-75-0x0000000000870000-0x00000000009EF000-memory.dmpFilesize
1.5MB
-
memory/1588-73-0x0000000000870000-0x00000000009EF000-memory.dmpFilesize
1.5MB
-
memory/1588-74-0x0000000001F60000-0x00000000026F0000-memory.dmpFilesize
7.6MB
-
memory/1588-63-0x0000000000000000-mapping.dmp
-
memory/1588-70-0x0000000001F60000-0x00000000026F0000-memory.dmpFilesize
7.6MB
-
memory/1588-76-0x000000000AF00000-0x000000000AF91000-memory.dmpFilesize
580KB
-
memory/1588-71-0x0000000000870000-0x00000000009EF000-memory.dmpFilesize
1.5MB
-
memory/1588-77-0x0000000000A10000-0x0000000000A17000-memory.dmpFilesize
28KB
-
memory/1588-80-0x000000000AF00000-0x000000000AF91000-memory.dmpFilesize
580KB
-
memory/1588-69-0x0000000001F60000-0x00000000026F0000-memory.dmpFilesize
7.6MB
-
memory/1960-60-0x00000000025C0000-0x000000000273F000-memory.dmpFilesize
1.5MB
-
memory/1960-66-0x00000000025C0000-0x000000000273F000-memory.dmpFilesize
1.5MB
-
memory/1960-54-0x0000000001E30000-0x00000000025C0000-memory.dmpFilesize
7.6MB
-
memory/1960-59-0x0000000001E30000-0x00000000025C0000-memory.dmpFilesize
7.6MB
-
memory/1960-58-0x00000000025C0000-0x000000000273F000-memory.dmpFilesize
1.5MB
-
memory/1960-57-0x00000000751A1000-0x00000000751A3000-memory.dmpFilesize
8KB
-
memory/1960-56-0x00000000025C0000-0x000000000273F000-memory.dmpFilesize
1.5MB
-
memory/1960-55-0x0000000001E30000-0x00000000025C0000-memory.dmpFilesize
7.6MB