Analysis
-
max time kernel
24s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe
Resource
win10v2004-20220812-en
General
-
Target
ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe
-
Size
217KB
-
MD5
3b73a39e49d514af3e2632616d12c9f4
-
SHA1
3d955bad2f33e6232c8fa13995174b1158a94aa6
-
SHA256
ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d
-
SHA512
149c59a5345f220e6f61ac0ebdadfe6f5a80281df0cf2da6dc36f77d82efe24e99128bdd0e88dd324c13564e1e31650dc27e54f52bf2be667e305204bb9a174f
-
SSDEEP
6144:8d93ZBZMbqYgomHmXbOkARuNaEruapAoMU22IUzYsD:8r3ZBIR2hErRpVF0sD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1396 13.exe -
Loads dropped DLL 9 IoCs
pid Process 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 1396 13.exe 1396 13.exe 1396 13.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe 1324 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1324 1396 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 912 wrote to memory of 1396 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 27 PID 912 wrote to memory of 1396 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 27 PID 912 wrote to memory of 1396 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 27 PID 912 wrote to memory of 1396 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 27 PID 912 wrote to memory of 1396 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 27 PID 912 wrote to memory of 1396 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 27 PID 912 wrote to memory of 1396 912 ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe 27 PID 1396 wrote to memory of 1324 1396 13.exe 28 PID 1396 wrote to memory of 1324 1396 13.exe 28 PID 1396 wrote to memory of 1324 1396 13.exe 28 PID 1396 wrote to memory of 1324 1396 13.exe 28 PID 1396 wrote to memory of 1324 1396 13.exe 28 PID 1396 wrote to memory of 1324 1396 13.exe 28 PID 1396 wrote to memory of 1324 1396 13.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe"C:\Users\Admin\AppData\Local\Temp\ab52fbed12e2f1e7169fb11005c9a0551ac3983b457da5644de10773faa8d44d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\13.exe"C:\Users\Admin\AppData\Local\Temp\13.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:1324
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652
-
Filesize
122KB
MD5916bb03a4c491ef1f24bc8435d6d4e67
SHA1a0b1e427bdf251f19f3d2baa28c94a04d4cc95ec
SHA2562238497bead1f39ac6f7b2ce0f3ebfefde39e832892b7c1e34907fa7a491ebde
SHA512ba4487b66224fd1258ba23d677f8bd15fba76c6ebe0d87bee07a3f4073317edab6323a5ac7f98550cfe1845ccec3cea1ebf0b597ea0ed7ea4ecb3fa475838652