Analysis
-
max time kernel
3s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2022 20:32
Static task
static1
Behavioral task
behavioral1
Sample
PO CBV87654469.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PO CBV87654469.exe
Resource
win10v2004-20220812-en
General
-
Target
PO CBV87654469.exe
-
Size
428KB
-
MD5
c6152a34c16494d6e75c276de8d76827
-
SHA1
4e75fb1f68ae10b98e432c443d740229c370453f
-
SHA256
d92c973ecc0a47bbb7d56fdec3471e90a88b49406b27b743f3f01433b0163ca8
-
SHA512
0a2accb3101a3a91babeb526f69e77865b25b01d2be0b19776f1663ac0f7cccf5611acebddecfc495dcfd8948a813a799fd4b5d2c6cfba836acce70fab6a0ab5
-
SSDEEP
6144:uTouKrWBEu3/Z2lpGDHU3ykJFqNbi/PRNU2Pg1++F8lTx4DN/Y8FyT+:uToPWBv/cpGrU3ywumk6g1bZDNw8Fyq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4972 1684 WerFault.exe xwsddqazr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO CBV87654469.exe"C:\Users\Admin\AppData\Local\Temp\PO CBV87654469.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\xwsddqazr.exe"C:\Users\Admin\AppData\Local\Temp\xwsddqazr.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\xwsddqazr.exe"C:\Users\Admin\AppData\Local\Temp\xwsddqazr.exe"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 4763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1684 -ip 16841⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\achvm.rmFilesize
111KB
MD5359a6caf917b1afbd4c95bb48e8b8845
SHA10f7bbf539e8334e1b2114272b6771924f75f2da7
SHA2561cbd0b2cf91d16bba768292491ac0253eaed3328b6672ae394272ea4c98ad412
SHA512bfa9a75f2208886d62f81e6b6a9eccf7fe9cb3b9b238e4a43650865b78509ba671d61ea40dd44c66ee89597e3f5a6aa0229870774d9c8a0ea0cfedf3d59697a7
-
C:\Users\Admin\AppData\Local\Temp\xpapnectlh.scFilesize
4KB
MD5e885fb743b9bff846d3e2b8a4449798c
SHA14c905a49a9a03153b49d0e785f63018ccb4bc74a
SHA2561c40c8c83e270b5322b3d3141ceea3bf37ce82dad5fb9f3e7630bdfe94089a0a
SHA512f9f9870a554003fbe3913c4816543b9d441c9d87b34ef07ce743dcc5c582cc120f6ba503f3de524006f396145cddd1f998cb489cdf83aed9f862be98fdab4023
-
C:\Users\Admin\AppData\Local\Temp\xwsddqazr.exeFilesize
57KB
MD5cb79ef15f5378caf0a87679a2bc441b8
SHA17e08672e9e7f478bc18786e486ca930cc29114db
SHA256a244ee10c1987f8a76171460b337923fcd861f6916677258362db2f39abcd6db
SHA5124c1da3e4ee8b897b8da2d55762973b24594e7237f259e4c406b1ee9764f9b8bfc8b72a6fd83902df16b504476edb5d56ff22e2c435aca7f1003925699fb87950
-
C:\Users\Admin\AppData\Local\Temp\xwsddqazr.exeFilesize
57KB
MD5cb79ef15f5378caf0a87679a2bc441b8
SHA17e08672e9e7f478bc18786e486ca930cc29114db
SHA256a244ee10c1987f8a76171460b337923fcd861f6916677258362db2f39abcd6db
SHA5124c1da3e4ee8b897b8da2d55762973b24594e7237f259e4c406b1ee9764f9b8bfc8b72a6fd83902df16b504476edb5d56ff22e2c435aca7f1003925699fb87950
-
C:\Users\Admin\AppData\Local\Temp\xwsddqazr.exeFilesize
57KB
MD5cb79ef15f5378caf0a87679a2bc441b8
SHA17e08672e9e7f478bc18786e486ca930cc29114db
SHA256a244ee10c1987f8a76171460b337923fcd861f6916677258362db2f39abcd6db
SHA5124c1da3e4ee8b897b8da2d55762973b24594e7237f259e4c406b1ee9764f9b8bfc8b72a6fd83902df16b504476edb5d56ff22e2c435aca7f1003925699fb87950
-
memory/1684-132-0x0000000000000000-mapping.dmp
-
memory/4412-137-0x0000000000000000-mapping.dmp