Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 00:58
Static task
static1
Behavioral task
behavioral1
Sample
fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe
Resource
win10v2004-20220812-en
General
-
Target
fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe
-
Size
159KB
-
MD5
448079e7811c266d2008db5b6b98a320
-
SHA1
8e3a30ba48d36bdeb32f444594c70f2853e9d4a5
-
SHA256
fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc
-
SHA512
5f95e44972e7b4eca153fd8f301a0834a3cc4f97e885e73b57f6bb06e78f7c247cea4172b86943f4a2b5fced8cf99f508b2d07979c3905403689b89d725bfa06
-
SSDEEP
3072:b1dlKwgj23+Oz05YoNozdQRMzsb5n6VZlu5rayBCNdAYwB96OaX0e9:b1dlZro5ydRsF61RYCNd7wr6ODA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 892 Server.exe -
Loads dropped DLL 1 IoCs
pid Process 1976 fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1552 892 WerFault.exe 26 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1976 wrote to memory of 892 1976 fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe 26 PID 1976 wrote to memory of 892 1976 fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe 26 PID 1976 wrote to memory of 892 1976 fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe 26 PID 1976 wrote to memory of 892 1976 fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe 26 PID 892 wrote to memory of 1552 892 Server.exe 27 PID 892 wrote to memory of 1552 892 Server.exe 27 PID 892 wrote to memory of 1552 892 Server.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe"C:\Users\Admin\AppData\Local\Temp\fbb4fd4faa095562ddadd649d9c4c86c5dc207969a36aa2a5f64ec40118873bc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Extracted\Server.exe"C:\Extracted\Server.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 892 -s 6563⤵
- Program crash
PID:1552
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD551ebc2d3d5d4a7482df580d302825dbb
SHA115c438d46983bbf488476eb77206fd7329df2fff
SHA25647248fb669123a817078676f26f52761ff51198b01027cccb0aa47cea665fdea
SHA512348e02d1b42e52c363c28e2dadc7ba248adc0177b91b67444e4165b19e7b998a51c366ca1520ca8ee59c12ecb06f46d2bf709d4296022413c820d6e9aa69b17a
-
Filesize
100KB
MD551ebc2d3d5d4a7482df580d302825dbb
SHA115c438d46983bbf488476eb77206fd7329df2fff
SHA25647248fb669123a817078676f26f52761ff51198b01027cccb0aa47cea665fdea
SHA512348e02d1b42e52c363c28e2dadc7ba248adc0177b91b67444e4165b19e7b998a51c366ca1520ca8ee59c12ecb06f46d2bf709d4296022413c820d6e9aa69b17a
-
Filesize
100KB
MD551ebc2d3d5d4a7482df580d302825dbb
SHA115c438d46983bbf488476eb77206fd7329df2fff
SHA25647248fb669123a817078676f26f52761ff51198b01027cccb0aa47cea665fdea
SHA512348e02d1b42e52c363c28e2dadc7ba248adc0177b91b67444e4165b19e7b998a51c366ca1520ca8ee59c12ecb06f46d2bf709d4296022413c820d6e9aa69b17a