Analysis
-
max time kernel
144s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe
Resource
win10v2004-20220812-en
General
-
Target
8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe
-
Size
139KB
-
MD5
07c3ff053b9a3ad933322f895683f1f0
-
SHA1
051cf6b461ece977f4037c408092a5e661fb8d2f
-
SHA256
8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3
-
SHA512
3626f6452a94326b13c124faf756403f5c2f68e37d19f416d3d01d1635f9773f906265a5ebac0555909876e00e79ca5a955783ae424c9d9a5e003216004340f0
-
SSDEEP
3072:doxctdaOZmPKWqdqp1mfwAHy60BrklUWYd0Hn3G3XMc:uxc9ZmPKN2QTS60hklUpeHI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1176 2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe 8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1976 1176 WerFault.exe 26 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1248 8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1176 1248 8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe 26 PID 1248 wrote to memory of 1176 1248 8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe 26 PID 1248 wrote to memory of 1176 1248 8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe 26 PID 1248 wrote to memory of 1176 1248 8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe 26 PID 1176 wrote to memory of 1976 1176 2.exe 27 PID 1176 wrote to memory of 1976 1176 2.exe 27 PID 1176 wrote to memory of 1976 1176 2.exe 27 PID 1176 wrote to memory of 1976 1176 2.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe"C:\Users\Admin\AppData\Local\Temp\8bffe0815cf7b1156988a770ce0ae479747bf2c9b2def4a98e1106c7316fa8b3.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 363⤵
- Program crash
PID:1976
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD55f790ed513dea0cf7571bcd6dc7c7549
SHA1bf056fe1e762a8b67f95d613e6dcba7e37576d67
SHA256cf52a020e517bd49c39cb6fba14b42ef96e1bf56fcb1eaff7b8284a7a6798ed3
SHA51255b026087f0ef0ad6a49044973247d41b84932297dd124404ee816d2c9392e43c444be43322edba2d12aabf80a3a667a9a074732d5add452be4f13b07e045e8a