Analysis
-
max time kernel
149s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 22:44
Static task
static1
Behavioral task
behavioral1
Sample
78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe
Resource
win10v2004-20220812-en
General
-
Target
78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe
-
Size
932KB
-
MD5
632f9d1b1cb373dba4cfdeba80a7f850
-
SHA1
7c41211269467fff63f47873784ae55c9afd3d42
-
SHA256
78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904
-
SHA512
e1be24129ddac4efa41669ef77d9d0df317b2299a7664d2d828716b65fe9f924e63580f1424617f05d50cf23d026fb4eefb9adeaa6e844f6fa990d5ce1f0732a
-
SSDEEP
24576:71/aGLDCM4D8ayGMZo8/5xN1NL/kLm9edGeakbTHN42EoNo9PFOt/:0D8ayGMZoExRjqV29Pm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1148 wvdwn.exe -
Loads dropped DLL 2 IoCs
pid Process 2012 78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe 2012 78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\wvdwn.exe" wvdwn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1148 2012 78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe 27 PID 2012 wrote to memory of 1148 2012 78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe 27 PID 2012 wrote to memory of 1148 2012 78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe 27 PID 2012 wrote to memory of 1148 2012 78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe"C:\Users\Admin\AppData\Local\Temp\78441d7250773a7d00cae8bc60ee1a64b72cdf5cc0f552e87d4c5af7b26cc904.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\ProgramData\wvdwn.exe"C:\ProgramData\wvdwn.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1148
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD571e38cb8371fa644436922e0eee6040d
SHA16e9e897cb95fd8434891e87a584f5f1b9482cae2
SHA2562c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4
SHA512852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be
-
Filesize
477KB
MD571e38cb8371fa644436922e0eee6040d
SHA16e9e897cb95fd8434891e87a584f5f1b9482cae2
SHA2562c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4
SHA512852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be
-
Filesize
454KB
MD5b9954623faaee31b727f0847f27b1184
SHA1abe8796cdde39813bd68fd3e522d2d50fde6cb86
SHA2560a5ea1cbb1dc2361b12dfb715dbc2b72e1f55ad00316c36666c817e6ee1a189f
SHA5125f5b7b09559423a33376baf2711b470934d966fdde1a897fd67bbe0adc01d23a2684b6057592596c8f0ca694f02915d76e7e4dd5f9b22d730c9934640cfe718c
-
Filesize
454KB
MD5b9954623faaee31b727f0847f27b1184
SHA1abe8796cdde39813bd68fd3e522d2d50fde6cb86
SHA2560a5ea1cbb1dc2361b12dfb715dbc2b72e1f55ad00316c36666c817e6ee1a189f
SHA5125f5b7b09559423a33376baf2711b470934d966fdde1a897fd67bbe0adc01d23a2684b6057592596c8f0ca694f02915d76e7e4dd5f9b22d730c9934640cfe718c
-
Filesize
454KB
MD5b9954623faaee31b727f0847f27b1184
SHA1abe8796cdde39813bd68fd3e522d2d50fde6cb86
SHA2560a5ea1cbb1dc2361b12dfb715dbc2b72e1f55ad00316c36666c817e6ee1a189f
SHA5125f5b7b09559423a33376baf2711b470934d966fdde1a897fd67bbe0adc01d23a2684b6057592596c8f0ca694f02915d76e7e4dd5f9b22d730c9934640cfe718c
-
Filesize
454KB
MD5b9954623faaee31b727f0847f27b1184
SHA1abe8796cdde39813bd68fd3e522d2d50fde6cb86
SHA2560a5ea1cbb1dc2361b12dfb715dbc2b72e1f55ad00316c36666c817e6ee1a189f
SHA5125f5b7b09559423a33376baf2711b470934d966fdde1a897fd67bbe0adc01d23a2684b6057592596c8f0ca694f02915d76e7e4dd5f9b22d730c9934640cfe718c