Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 11:32
Static task
static1
Behavioral task
behavioral1
Sample
6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe
Resource
win10v2004-20220812-en
General
-
Target
6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe
-
Size
148KB
-
MD5
60097d78b0b4e566099f115ba4258b09
-
SHA1
2ae031bf261efda6ddc41d1f328b59e66e87c3a9
-
SHA256
6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b
-
SHA512
dd0520534f2bbadd645e7fcbf92a55713f26428fbec34d094095ce6d5c24c84afa35ed4ca9fe391b68e068a54c898e3578d31fd2fbeed9cc6d788425abb0b7d4
-
SSDEEP
3072:867ujHo5TeowSj6c0EOlavl+rB3BfS8dOo:86qjI5TZLjcEOQvlovK8dOo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1604 WcxG2PFxN88niE2.exe -
Deletes itself 1 IoCs
pid Process 1608 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 820 cmd.exe 820 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1300 wrote to memory of 820 1300 6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe 27 PID 1300 wrote to memory of 820 1300 6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe 27 PID 1300 wrote to memory of 820 1300 6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe 27 PID 1300 wrote to memory of 820 1300 6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe 27 PID 1300 wrote to memory of 1608 1300 6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe 29 PID 1300 wrote to memory of 1608 1300 6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe 29 PID 1300 wrote to memory of 1608 1300 6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe 29 PID 1300 wrote to memory of 1608 1300 6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe 29 PID 820 wrote to memory of 1604 820 cmd.exe 31 PID 820 wrote to memory of 1604 820 cmd.exe 31 PID 820 wrote to memory of 1604 820 cmd.exe 31 PID 820 wrote to memory of 1604 820 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe"C:\Users\Admin\AppData\Local\Temp\6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WcxG2PFxN88niE2.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\WcxG2PFxN88niE2.exe"C:\Users\Admin\AppData\Local\Temp\WcxG2PFxN88niE2.exe"3⤵
- Executes dropped EXE
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe.bat" "2⤵
- Deletes itself
PID:1608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6efdaec1d498bab7cb960066b8aa4516678bc6cdde5874f50c8a5c3f0192994b.exe.bat
Filesize525B
MD520e15bcae79c366708bc8d47897d535a
SHA1f05183d60140d4875f0717bc200f596e0b31354d
SHA25659829c85ffa3a80a827215f394c6d03eb9358a82e2d9e1e6606bcef06bcdba6e
SHA512df7bcb5b90178df437bf7f3e1dcb2c6db1bf76d9061e2e0bfb4795bd1e8cb891b2062f9cb077d59b3430ca5c85568a031f715378e23bedfb544783fd295e66b3
-
Filesize
111KB
MD5f0711f119c13d4ac131dadc1a10e1e73
SHA15add269200c12afc9cebc063db952e93ebc96118
SHA256b81844f5eb896ae494b06c90cb2fe57e4f546cfac1c8ff367c38e66bdf2872d6
SHA5127e3bbef2ca3efc9fe324f89e61649c8e5249f04ae505a12e93d074a6074e9313fd106768d917ce961f49d08c0f16162094be49977e431a2913b28aee34c3e814
-
Filesize
111KB
MD5f0711f119c13d4ac131dadc1a10e1e73
SHA15add269200c12afc9cebc063db952e93ebc96118
SHA256b81844f5eb896ae494b06c90cb2fe57e4f546cfac1c8ff367c38e66bdf2872d6
SHA5127e3bbef2ca3efc9fe324f89e61649c8e5249f04ae505a12e93d074a6074e9313fd106768d917ce961f49d08c0f16162094be49977e431a2913b28aee34c3e814
-
Filesize
207B
MD51c29953850bec03428d8dae06365064d
SHA18eb33b34790d8f4c63d60bc43956bfe1b68d5649
SHA2567ff0677d4d487a47e8492f7d810ac589a53356e06112376ea78616d1d973921d
SHA5121e9778f605a3d74ee2aa45ce90d72ec3788321ddf1e7d4d0a0c726dd3faee7786e2bea9a6b997a12ccd967c237e8c0d8c17c36aea3a1b3d6093fe14776e4cb90
-
Filesize
111KB
MD5f0711f119c13d4ac131dadc1a10e1e73
SHA15add269200c12afc9cebc063db952e93ebc96118
SHA256b81844f5eb896ae494b06c90cb2fe57e4f546cfac1c8ff367c38e66bdf2872d6
SHA5127e3bbef2ca3efc9fe324f89e61649c8e5249f04ae505a12e93d074a6074e9313fd106768d917ce961f49d08c0f16162094be49977e431a2913b28aee34c3e814
-
Filesize
111KB
MD5f0711f119c13d4ac131dadc1a10e1e73
SHA15add269200c12afc9cebc063db952e93ebc96118
SHA256b81844f5eb896ae494b06c90cb2fe57e4f546cfac1c8ff367c38e66bdf2872d6
SHA5127e3bbef2ca3efc9fe324f89e61649c8e5249f04ae505a12e93d074a6074e9313fd106768d917ce961f49d08c0f16162094be49977e431a2913b28aee34c3e814