Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 22:03
Static task
static1
Behavioral task
behavioral1
Sample
f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe
Resource
win10v2004-20220812-en
General
-
Target
f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe
-
Size
544KB
-
MD5
48a90346ad68974abb515a7b47e2a7c8
-
SHA1
190b1d7dae92d3755a78d88c7bc6f9fd4d0cf155
-
SHA256
f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd
-
SHA512
215fae304b840771582fec90ddc27a7b519d6c8b94c3f48a53ea997d2ea8871c2d6ab588117f49b64210f3d42a4498c7dde875ead19effc5d07e0f5e6dd463cd
-
SSDEEP
12288:HJUzLBeJqq8N1BB+pCqbX3xDUsVlUMMEVCoWzG:HG3BePm1BB+pZnKsVlUMMovT
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1952 cmd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exedescription ioc process File opened for modification \??\PhysicalDrive0 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe -
Drops file in Program Files directory 2 IoCs
Processes:
f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exedescription ioc process File created C:\Program Files (x86)\Adobe Media Player\assets\iebbbce.jse f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe File created C:\Program Files (x86)\DriveTheLife\Drivers\mifffgi.jse f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 41 IoCs
Processes:
wscript.exewscript.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\IsShortcut wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\open wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex\ContextMenuHandlers\ wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex\IconHandler wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\open wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\NeverShowExt wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\DefaultIcon\ = "%SystemRoot%\\SysWow64\\url.dll,0" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex\IconHandler\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\NeverShowExt wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex\ContextMenuHandlers\ wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\open\command wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\open\command\ = "WScript.exe /B \"C:\\Program Files (x86)Intel\\Logs\\gczzzac.jse\" \"%1\"" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex\IconHandler wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\IsShortcut wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\CLSID\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.solll wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\ = "????" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\CLSID\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\open\command wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex\ContextMenuHandlers wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.solll\ = "uqnnnoq" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\DefaultIcon\ = "%SystemRoot%\\SysWow64\\url.dll,0" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\ = "open" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex\ContextMenuHandlers wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.solll\ = "uqnnnoq" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.solll wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\ = "????" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\open\CLSID = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shellex\IconHandler\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\CLSID wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\ = "open" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell\open\command\ = "WScript.exe /B \"C:\\Program Files (x86)Intel\\Logs\\gczzzac.jse\" \"%1\"" wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\DefaultIcon wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\CLSID wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\uqnnnoq\shell wscript.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exepid process 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exedescription pid process target process PID 840 wrote to memory of 332 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe wscript.exe PID 840 wrote to memory of 332 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe wscript.exe PID 840 wrote to memory of 332 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe wscript.exe PID 840 wrote to memory of 332 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe wscript.exe PID 840 wrote to memory of 1036 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe cmd.exe PID 840 wrote to memory of 1036 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe cmd.exe PID 840 wrote to memory of 1036 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe cmd.exe PID 840 wrote to memory of 1036 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe cmd.exe PID 840 wrote to memory of 1028 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe wscript.exe PID 840 wrote to memory of 1028 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe wscript.exe PID 840 wrote to memory of 1028 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe wscript.exe PID 840 wrote to memory of 1028 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe wscript.exe PID 840 wrote to memory of 1952 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe cmd.exe PID 840 wrote to memory of 1952 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe cmd.exe PID 840 wrote to memory of 1952 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe cmd.exe PID 840 wrote to memory of 1952 840 f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe"C:\Users\Admin\AppData\Local\Temp\f6d01fcdf05b6a291cf46efc347b483c07c337d20d9fffff79f8ccd28d8cfacd.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exewscript.exe /B "C:\Program Files (x86)\DriveTheLife\Drivers\mifffgi.jse"2⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$dss.bat2⤵
-
C:\Windows\SysWOW64\wscript.exewscript.exe /B "C:\Program Files (x86)Intel\Logs\gczzzac.jse" FirstSetup2⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$dmsf.bat2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)Intel\Logs\gczzzac.jseFilesize
28KB
MD50e333bab9dc604f29cd1da6c34bacefa
SHA1c78094283924e6dd7be6c0304eb74d2bfbd92e01
SHA256b97bfd684f0fc41fa7f8bdddaa58497f93a1ac60327dc0b18e2c0353146047fe
SHA512d18022aa87aaa7ad8669d102da828e9e92a3ff3a9a4825799234eb5cdaf13c7dab7863de484a39d21bc10c8b3d9b6b3c94f50472f3823cd79ec423aa029c453f
-
C:\Program Files (x86)\DriveTheLife\Drivers\mifffgi.jseFilesize
1KB
MD51e4063e05d1eb1ecc08cf945df34d5ce
SHA16a78abb59b1b19d0493d8f2487b96688da78cdcf
SHA256f9a887ddac026115c0dfe4fad564b7caac17c2c7d9237e3bb886cfebccdfd1c8
SHA512b0f1bf871c692bc73985bf9c6d597b2eac2e7160252f7247b42d2f45544089db0d55df21d41d61eb10f14517a88c6dc59cd9a5fa51d13cc2b01de4da06485e52
-
C:\Users\Admin\AppData\Local\Temp\$$dmsf.batFilesize
309B
MD5357d2484d4ca42007882e82728332b99
SHA18169bcba3f0319642525ee450c458843801d1b62
SHA2569dfd8f1661ffd1f82a00f1127ad298aa4ef00760c4c4834d3905c140291af187
SHA51251e856bfa8da47176b0ea5be6e56a9a59abbd8a9574ce46622ef03879402762a3314ce6ba5427a76304d3cea508383a21c0aae67b3297fda56e8ff1e6b068667
-
C:\Users\Admin\AppData\Local\Temp\$$dss.batFilesize
246B
MD5b211c858d10413d5a58614b36a4c2c86
SHA15c374bd632cc5199c6e73bee53567a6e4f0787e1
SHA2561ffc57fda104ab8bd80a025624bd558d1b69332f55cb20844c5122c7af0e3654
SHA512a65ff4d4658fb409f2470cbeef5e128bf6ef439bef9c6dc3046afa19ff731ae349571f0dcf50dc20932f3508e43049a3a9455a9a4d6861b3a7fb1f312a5d3f53
-
C:\Users\Admin\AppData\Local\Temp\TaoBao.tmpFilesize
143B
MD5fdbe75eee63e579fc4d54d5e96ffdc05
SHA16e4e0665f4ef8f058f815d9457f55d1fd1b1681e
SHA2564434bbb1a63da852a06a95cae272a9387e045f2327f1aa71b10e8e524761ff44
SHA5122a478daeded3250d3dfa1ac0d8d3f6fe763bccd29d8b116e4b7db5e28f6c2ba6cf5d19e44db1e1c4a4f10df5aab87c1196c8140b5bcc34a997853f6b971a2f8b
-
memory/332-56-0x0000000000000000-mapping.dmp
-
memory/840-54-0x0000000076561000-0x0000000076563000-memory.dmpFilesize
8KB
-
memory/840-55-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/840-66-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/1028-61-0x0000000000000000-mapping.dmp
-
memory/1036-58-0x0000000000000000-mapping.dmp
-
memory/1952-65-0x0000000000000000-mapping.dmp