Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe
Resource
win10v2004-20220901-en
General
-
Target
f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe
-
Size
31KB
-
MD5
70ddf17a57852b46ab7499c0a9fac1f0
-
SHA1
4fb3f0307808b73cdd61583fc7d0110795c3d8c5
-
SHA256
f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64
-
SHA512
3446cbeb454bd0ba319310f30dc57745bfc7a6993b37166d44e39ca8bc1dfa7bdc4f02f797b6ce32d5c088af5842379a2b3bd4a06d296ca24c410fb2e151addc
-
SSDEEP
768:X6LsoEEeegiZPvEhHSG+gp/QtOOtEvwDpjBVajSKCfg:X6QFElP6n+gJQMOtEvwDpjBcSKCfg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1076 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2020 f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1076 2020 f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe 26 PID 2020 wrote to memory of 1076 2020 f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe 26 PID 2020 wrote to memory of 1076 2020 f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe 26 PID 2020 wrote to memory of 1076 2020 f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe"C:\Users\Admin\AppData\Local\Temp\f70b7ac2b72cdc1ae30db2ab4d67076ca5b2e02b7a2a308be72bc043f3bd5d64.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:1076
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5c4f6255a45ee68b00ab44c5e1f1593a4
SHA16793482c1253ab8c466c71843d21b229ad85bbbb
SHA256e4aa7fef6d737abe27e5eac1eb613e0477f97e587e5827c71ae964fadff30995
SHA51256019f54701ba53547455861fdebfcf0d4502fc896bf6e05dbd6b00f83cf584df9ef881fcd002433db2cbd18177721685f40390055399ea08f2d3b4cc67b5196
-
Filesize
31KB
MD5c4f6255a45ee68b00ab44c5e1f1593a4
SHA16793482c1253ab8c466c71843d21b229ad85bbbb
SHA256e4aa7fef6d737abe27e5eac1eb613e0477f97e587e5827c71ae964fadff30995
SHA51256019f54701ba53547455861fdebfcf0d4502fc896bf6e05dbd6b00f83cf584df9ef881fcd002433db2cbd18177721685f40390055399ea08f2d3b4cc67b5196
-
Filesize
31KB
MD5c4f6255a45ee68b00ab44c5e1f1593a4
SHA16793482c1253ab8c466c71843d21b229ad85bbbb
SHA256e4aa7fef6d737abe27e5eac1eb613e0477f97e587e5827c71ae964fadff30995
SHA51256019f54701ba53547455861fdebfcf0d4502fc896bf6e05dbd6b00f83cf584df9ef881fcd002433db2cbd18177721685f40390055399ea08f2d3b4cc67b5196