Analysis
-
max time kernel
108s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/10/2022, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
636b0fd7545ec757b73be4ed4fe5cf59fb94416ed8a0f0c31780fefb254ab258.exe
Resource
win10-20220812-en
General
-
Target
636b0fd7545ec757b73be4ed4fe5cf59fb94416ed8a0f0c31780fefb254ab258.exe
-
Size
1.6MB
-
MD5
d35484e944c164b7fa969552bf0188cd
-
SHA1
d3ac293de4b11488f1758d5f52212aa5b6cd866c
-
SHA256
636b0fd7545ec757b73be4ed4fe5cf59fb94416ed8a0f0c31780fefb254ab258
-
SHA512
c70f0e3c6bf63b563569797eac05e978f256792c3933ac7268c6899a1d17c1210b12bafe4e0f03fa8c34b382f5beac25b30923b68ee0bb6ea80916b4e6acb9ed
-
SSDEEP
49152:gJ4N+diKTvx2SRTCdrdr7/hQz4XV2mI4xwF5:gJ4Ad7TvxeN7/hw6Var
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4432 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 4432 2368 636b0fd7545ec757b73be4ed4fe5cf59fb94416ed8a0f0c31780fefb254ab258.exe 66 PID 2368 wrote to memory of 4432 2368 636b0fd7545ec757b73be4ed4fe5cf59fb94416ed8a0f0c31780fefb254ab258.exe 66 PID 2368 wrote to memory of 4432 2368 636b0fd7545ec757b73be4ed4fe5cf59fb94416ed8a0f0c31780fefb254ab258.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\636b0fd7545ec757b73be4ed4fe5cf59fb94416ed8a0f0c31780fefb254ab258.exe"C:\Users\Admin\AppData\Local\Temp\636b0fd7545ec757b73be4ed4fe5cf59fb94416ed8a0f0c31780fefb254ab258.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" -y .\8IXK.Sep2⤵
- Loads dropped DLL
PID:4432
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD510c715fa5f87c8238044a3ceddded6e9
SHA129b91b0ae1195ede891b040fc2683c3240269fca
SHA2565bda5bf30bc73a96bf3ac61cf9ff18e26a4b0acb41055fda903918e1fab5bd0d
SHA5127d3506a7f50a53239051c8c7d2f1c1a510d7341eb585911ec66d4c2f2f5c9b03428f29920ffcd3d3cf51638a7bf29c6044672d3ae775f14bca0dbfb7682c1f87
-
Filesize
1.5MB
MD510c715fa5f87c8238044a3ceddded6e9
SHA129b91b0ae1195ede891b040fc2683c3240269fca
SHA2565bda5bf30bc73a96bf3ac61cf9ff18e26a4b0acb41055fda903918e1fab5bd0d
SHA5127d3506a7f50a53239051c8c7d2f1c1a510d7341eb585911ec66d4c2f2f5c9b03428f29920ffcd3d3cf51638a7bf29c6044672d3ae775f14bca0dbfb7682c1f87