Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 23:19
Static task
static1
Behavioral task
behavioral1
Sample
2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe
Resource
win10v2004-20220812-en
General
-
Target
2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe
-
Size
177KB
-
MD5
6d16b6a9cfb070e77fd39ab766df5cd0
-
SHA1
8a5feaec20b581b3500abb67f7faf43669fafffe
-
SHA256
2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c
-
SHA512
7cf2949d7a18c1b6017df30a6847c8b3311cdf6673157ff7b4592c0cba56b42424d6ed0080ace7c3b19d57c20222cd246f338f957c1492127fcd3a565b130706
-
SSDEEP
3072:H5BuYAVrgUCPn/VCaph4rofRoRd2ct46HQpZdRUK7GToO:H50gUCwaphtdctzH6fpGToO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4476 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 4908 2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe 4908 2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe 4908 2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe 4476 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4476 4908 2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe 81 PID 4908 wrote to memory of 4476 4908 2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe 81 PID 4908 wrote to memory of 4476 4908 2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe"C:\Users\Admin\AppData\Local\Temp\2a4604380ab34b43ef3a9113489254c0b17c2ddbf97623bb89e967e6941ef11c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\nsa9715.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\nsa9715.tmp\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4476
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5e0c52a94b5611add37fe344df5b1861d
SHA18d18a7a23269eb206154ff897f9c2aacfa488b46
SHA256ae134fc2a5fa8897fd935630ff454d4b8690a7236f51663737d744e41fa36819
SHA512d2eb43bcf8b645a5fc72a62780ac0e2c31f5630da6a589341afe2e6140497df912d98070b9df777dbfb0ca581377ab7730b6b7f0f20741f1b79258b21022c555
-
Filesize
15KB
MD57caaf58a526da33c24cbe122e7839693
SHA17687112cb6593947226f8a8319d6e2d0cdef3b11
SHA25619debdc4c0b6f5dc9582bda7a2c1146516f683e8d741190e6d4b81ad10b33f61
SHA512aafd0cb2abb3d2dee95c2d037a6a1a5bff0518e3210ced0c39e6d6696e4fab4734df01476fe9dcb208f02c529cd03346bc8b7f3319ae49701bbf2cb453d59bae
-
Filesize
15KB
MD57caaf58a526da33c24cbe122e7839693
SHA17687112cb6593947226f8a8319d6e2d0cdef3b11
SHA25619debdc4c0b6f5dc9582bda7a2c1146516f683e8d741190e6d4b81ad10b33f61
SHA512aafd0cb2abb3d2dee95c2d037a6a1a5bff0518e3210ced0c39e6d6696e4fab4734df01476fe9dcb208f02c529cd03346bc8b7f3319ae49701bbf2cb453d59bae
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
72KB
MD5cc3315bfd85148caceb65a690bee8480
SHA14d8aa788eeffe5ae7b459ff0eb4599f22fa3809f
SHA25691e6ad589d18619aff08403c9124729fbbd22cffca15973395c8b3052eca1508
SHA512e05c09cc55b7a14897f1e7e1d78be27f77815964cab21da2a45089d2ba8da62d6ee5a313a7caef93a2a5fead27094863e5cf2dccfb7c831a3bb3a7b70fc14561
-
Filesize
72KB
MD5cc3315bfd85148caceb65a690bee8480
SHA14d8aa788eeffe5ae7b459ff0eb4599f22fa3809f
SHA25691e6ad589d18619aff08403c9124729fbbd22cffca15973395c8b3052eca1508
SHA512e05c09cc55b7a14897f1e7e1d78be27f77815964cab21da2a45089d2ba8da62d6ee5a313a7caef93a2a5fead27094863e5cf2dccfb7c831a3bb3a7b70fc14561