Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7.exe
Resource
win10v2004-20220812-en
General
-
Target
195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7.exe
-
Size
137KB
-
MD5
6dfc0ed2ed2b17423ac2b95cde9c32b6
-
SHA1
23ca73dc9f6b5184316c19d89b0650e5fd5b8919
-
SHA256
195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7
-
SHA512
ca20f19ea1af6c494528c2cb8f894fa6a20999fb30a7aad8f978a2c7709aaffd40c00aee918d6e5a79ea43652598ca3cd5350a8f92947837c4331e603f92256d
-
SSDEEP
3072:DQIURTXJ+M7ssvRwHH20gfZJ0a5eDAnWzKyu+VrNd7Ip:Ds9xRw20iWzlIp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4816 mggkasxz.exe 3772 mggkasxz.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4816 set thread context of 3772 4816 mggkasxz.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4708 4816 WerFault.exe 82 2576 3772 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3772 mggkasxz.exe 3772 mggkasxz.exe 3772 mggkasxz.exe 3772 mggkasxz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4816 mggkasxz.exe 4816 mggkasxz.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4816 3344 195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7.exe 82 PID 3344 wrote to memory of 4816 3344 195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7.exe 82 PID 3344 wrote to memory of 4816 3344 195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7.exe 82 PID 4816 wrote to memory of 3772 4816 mggkasxz.exe 86 PID 4816 wrote to memory of 3772 4816 mggkasxz.exe 86 PID 4816 wrote to memory of 3772 4816 mggkasxz.exe 86 PID 4816 wrote to memory of 3772 4816 mggkasxz.exe 86 PID 4816 wrote to memory of 3772 4816 mggkasxz.exe 86 PID 4816 wrote to memory of 3772 4816 mggkasxz.exe 86 PID 4816 wrote to memory of 3772 4816 mggkasxz.exe 86 PID 4816 wrote to memory of 3772 4816 mggkasxz.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7.exe"C:\Users\Admin\AppData\Local\Temp\195381503ee6f2f3b4af0ada7fbffd783772612bd7da90d5c9bea4404e147fd7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\mggkasxz.exeC:\Users\Admin\AppData\Local\Temp\mggkasxz.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 5123⤵
- Program crash
PID:4708
-
-
C:\Users\Admin\AppData\Local\Temp\mggkasxz.exeC:\Users\Admin\AppData\Local\Temp\mggkasxz.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 7444⤵
- Program crash
PID:2576
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4816 -ip 48161⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3772 -ip 37721⤵PID:2164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5a55aa5c7986dcb7f87e736e47b9c1010
SHA146260e62c30a3837cb2c16a2d8c0471ac6e08c7f
SHA256f3ca5724754554610c536d41b4b9b7e6918844f52cd13f44214f2c61ad8383d8
SHA512d9fa3c70c7f39a86b8d39729102ec3f69ba078b49da25d6ebf6b88b3a4ca18fdcf33e8ffddf04dbb2b00ed322d02a0b67cc55988f6432eb2219b3bfc74e4ebe3
-
Filesize
79KB
MD5a55aa5c7986dcb7f87e736e47b9c1010
SHA146260e62c30a3837cb2c16a2d8c0471ac6e08c7f
SHA256f3ca5724754554610c536d41b4b9b7e6918844f52cd13f44214f2c61ad8383d8
SHA512d9fa3c70c7f39a86b8d39729102ec3f69ba078b49da25d6ebf6b88b3a4ca18fdcf33e8ffddf04dbb2b00ed322d02a0b67cc55988f6432eb2219b3bfc74e4ebe3
-
Filesize
79KB
MD5a55aa5c7986dcb7f87e736e47b9c1010
SHA146260e62c30a3837cb2c16a2d8c0471ac6e08c7f
SHA256f3ca5724754554610c536d41b4b9b7e6918844f52cd13f44214f2c61ad8383d8
SHA512d9fa3c70c7f39a86b8d39729102ec3f69ba078b49da25d6ebf6b88b3a4ca18fdcf33e8ffddf04dbb2b00ed322d02a0b67cc55988f6432eb2219b3bfc74e4ebe3
-
Filesize
57KB
MD5869450b6fc847af6a2b7f684c1f97d20
SHA15c73dff1f6bb6d789ca13a0c47a2fc99dca20ec0
SHA25685f585ed7891e51ab9b163d1aa9a6bc28b3198784351deabe0e59a58677cba7c
SHA5120f453a1066bf200e5d3b624ce9fc33fdc534f94bcaa836c12a3f34204d65bae1aabeab36e4dc28efd8758d85965cecdb0a084a28943e355e7f15c384e5b7b970