Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 10:31 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe
Resource
win10v2004-20220812-en
General
-
Target
5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe
-
Size
94KB
-
MD5
63c666d3be7b923c966a23891b18eba0
-
SHA1
6e619cc0002e32f339da50014987649153262f57
-
SHA256
5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd
-
SHA512
ca329cf4449199181446e69d065cfaac8db75964f51e43947b3c5f8e2caf2256e2b3f95849cc418cd9c6e33d3ad3bd4ed1dbdb7605c215aae585c58ac1447a50
-
SSDEEP
1536:HvmG2zuawM5Txwn99lje8XN0PCnGhiNL6iuqCnxjoww43+XhL:H+ZwT/Ve2JGhilaqChowT09
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 596 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 996 wrote to memory of 596 996 5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe 27 PID 996 wrote to memory of 596 996 5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe 27 PID 996 wrote to memory of 596 996 5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe 27 PID 996 wrote to memory of 596 996 5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe"C:\Users\Admin\AppData\Local\Temp\5e4b15435b9aabf9d0885b063ec42e762244e0d76dfc1d6fb6426e1f94bbb1dd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Uwp..bat" > nul 2> nul2⤵
- Deletes itself
PID:596
-
Network
-
Remote address:8.8.8.8:53Requestikea.comIN AResponseikea.comIN A23.203.72.42
-
Remote address:8.8.8.8:53Requestsitesell.comIN AResponsesitesell.comIN A172.67.75.143sitesell.comIN A104.26.11.231sitesell.comIN A104.26.10.231
-
Remote address:8.8.8.8:53Requestgoogle.aeIN AResponsegoogle.aeIN A142.251.39.99
-
Remote address:8.8.8.8:53Requestgexque.inIN AResponse
-
Remote address:8.8.8.8:53Requestrooftopjam.inIN AResponse
-
Remote address:8.8.8.8:53Requestjumppack.inIN AResponse
-
54 B 70 B 1 1
DNS Request
ikea.com
DNS Response
23.203.72.42
-
58 B 106 B 1 1
DNS Request
sitesell.com
DNS Response
172.67.75.143104.26.11.231104.26.10.231
-
55 B 71 B 1 1
DNS Request
google.ae
DNS Response
142.251.39.99
-
55 B 108 B 1 1
DNS Request
gexque.in
-
59 B 112 B 1 1
DNS Request
rooftopjam.in
-
57 B 110 B 1 1
DNS Request
jumppack.in
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5fe3c225af55ff133f968b9b86da0279a
SHA1047a78bec540e49f99104712917f5ea26e57e813
SHA25692c05b124905d191414ce4cbdb50ac49fe03849c10549b746fdfc0497b40f70e
SHA512307b56876d54b482a8d9031f4df66cc70f933009837bfe0ef662aae1455fa60446ecc468ed96df10615acbe43c6065317fa43c44c740678d0ff5a8b4baf3d7c7