Analysis
-
max time kernel
164s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe
Resource
win10v2004-20220812-en
General
-
Target
3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe
-
Size
597KB
-
MD5
643b50bdb6dbabde1748c43b70114960
-
SHA1
e2a2ff8e5c29bee5baef325b56406184645b6d7a
-
SHA256
3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012
-
SHA512
7038df6130efc46a11c969972fab828a9e9df45788495adcdd9bed2a1126355fa9df765988cb4bcb7d5857820b8304b59e42d158fafb1b7085bac868a9fa1976
-
SSDEEP
6144:dcJkl8DV12C28tLN2/FpCOLIYGAloERzlu7wZBuE2TRXOwAC8pE:d5GL2C2aZ2/FgQTL/Rzlu7PRQo
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4140 dujya.exe 640 nymoi.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation dujya.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe 640 nymoi.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4140 4800 3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe 82 PID 4800 wrote to memory of 4140 4800 3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe 82 PID 4800 wrote to memory of 4140 4800 3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe 82 PID 4800 wrote to memory of 2008 4800 3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe 83 PID 4800 wrote to memory of 2008 4800 3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe 83 PID 4800 wrote to memory of 2008 4800 3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe 83 PID 4140 wrote to memory of 640 4140 dujya.exe 86 PID 4140 wrote to memory of 640 4140 dujya.exe 86 PID 4140 wrote to memory of 640 4140 dujya.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe"C:\Users\Admin\AppData\Local\Temp\3c716bbe4f19374e33e94307019d261fac6b5912f47c385c9aa2e61480ec1012.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\dujya.exe"C:\Users\Admin\AppData\Local\Temp\dujya.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\nymoi.exe"C:\Users\Admin\AppData\Local\Temp\nymoi.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵PID:2008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340B
MD5bba98b09621d2cc1ea5200dfecd1c25b
SHA149f257453e715e00d1113f729d6af4cf6111725d
SHA25684cdeed7d32e540f20d7b7da904fc9855cc9b865ebcc6ccb38ac1867e073113e
SHA5129ad799dd2a3848c1d2850c406cb939f0c09cf0e5faa7fd16de7f7b7839596c05982fb0936dba983acbc6e5410fc8ef0d43daca38d55fb5c2bf65e8f98b62f2ce
-
Filesize
597KB
MD517e3e7f92a578b7977e43d399f23aa8b
SHA1dfc1f78672b9033ae478d45421ed285434bdbd76
SHA2566c398c757dd1cfee87b44d1c16704a67ce9c35bf0d04bbe5a64e62476eaff2c7
SHA512f66a51ec35fed9093dca7a234375b35b5dd7709c1738b6b5e91189cc77707b87ce6dfaaefe58297107e6c791e67eac44155196bac62950315a0a3a3eef1b9957
-
Filesize
597KB
MD517e3e7f92a578b7977e43d399f23aa8b
SHA1dfc1f78672b9033ae478d45421ed285434bdbd76
SHA2566c398c757dd1cfee87b44d1c16704a67ce9c35bf0d04bbe5a64e62476eaff2c7
SHA512f66a51ec35fed9093dca7a234375b35b5dd7709c1738b6b5e91189cc77707b87ce6dfaaefe58297107e6c791e67eac44155196bac62950315a0a3a3eef1b9957
-
Filesize
512B
MD563d707df01d361203bace33f0d37feb1
SHA11680d7b5f8c71c8d920be5bebd02347df2da96f7
SHA25682536ef100aa29576dadb044b2f502dd709c28de621c51131b0c75c8a7fc3652
SHA5122bb8d8b9d0e58bf61436d3ddbb66d20776945b0220ba2cbe0a6ba6fdad000bb5c87d24eb2bd5b386c68e9fa7359ce9e61e1132b070ee394bc6875795fd80ce02
-
Filesize
166KB
MD544dccf6069ccecc380b489343aec19f6
SHA1a6c0e84c308f6ce7125577c3d6aef9dae6b552b0
SHA2562415ee9ba8d82af9ba68f436b46df03ff80bb0187a6822f682b4047f9e8a8bbc
SHA5128b790f117aa067ec6f14317c940f27986efcedf8ea653e879c5df7521cbc8fbc6f6d8f9854b4551f8117f4a27aee2feeed164ad3ef891edcf5f2fa3ff7f9c302
-
Filesize
166KB
MD544dccf6069ccecc380b489343aec19f6
SHA1a6c0e84c308f6ce7125577c3d6aef9dae6b552b0
SHA2562415ee9ba8d82af9ba68f436b46df03ff80bb0187a6822f682b4047f9e8a8bbc
SHA5128b790f117aa067ec6f14317c940f27986efcedf8ea653e879c5df7521cbc8fbc6f6d8f9854b4551f8117f4a27aee2feeed164ad3ef891edcf5f2fa3ff7f9c302