Analysis
-
max time kernel
57s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe
Resource
win10v2004-20220901-en
General
-
Target
ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe
-
Size
180KB
-
MD5
15a1666d54e2f96463a8bf70f343c034
-
SHA1
4ed409f495806f986ef93afb5cf578641dc7b173
-
SHA256
ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c
-
SHA512
63ccde1952196b48e0853e82cb116ea54f611ec4c46a0a9024700e483717d2edac8718570a610ca73dfc606346a90ce6948755b9b6c26d4d31094c71a7aa0870
-
SSDEEP
3072:TBAp5XhKpN4eOyVTGfhEClj8jTk+0h6eXmw:+bXE9OiTGfhEClq9deXb
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1484 WScript.exe 4 1484 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\popizdota.dot ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe File opened for modification C:\Program Files (x86)\na ulisdf\take me tsdf\333\why_do_you_cry_willy.bat ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe File opened for modification C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\____000000_hello__.vbs ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe File opened for modification C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\_hello______22222_______.vbs ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1232 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 27 PID 1380 wrote to memory of 1232 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 27 PID 1380 wrote to memory of 1232 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 27 PID 1380 wrote to memory of 1232 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 27 PID 1380 wrote to memory of 700 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 29 PID 1380 wrote to memory of 700 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 29 PID 1380 wrote to memory of 700 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 29 PID 1380 wrote to memory of 700 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 29 PID 1380 wrote to memory of 1484 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 30 PID 1380 wrote to memory of 1484 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 30 PID 1380 wrote to memory of 1484 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 30 PID 1380 wrote to memory of 1484 1380 ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe"C:\Users\Admin\AppData\Local\Temp\ae9bd2412b4e0da7bc88661f31b47a43911110cad21d251fd9e839004f95265c.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\na ulisdf\take me tsdf\333\why_do_you_cry_willy.bat" "2⤵
- Drops file in Drivers directory
PID:1232
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\____000000_hello__.vbs"2⤵
- Drops file in Drivers directory
PID:700
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\na ulisdf\take me tsdf\poztfiz\_hello______22222_______.vbs"2⤵
- Blocklisted process makes network request
PID:1484
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aa506bef8fa798ddddf0ed9e70ec1207
SHA170e4fa8356ecedb4ddf88251d801580b944ec457
SHA256fb63d748a48680fae56b5a06f91d1c1ec71055211196ae287597678657dd9f02
SHA512121969898e89cc8369bbb7cf324b91a909c4eae0cc8cf68a6b7a1cf1409ee24d30d14dbd43e0d330d37d38badd976c485f64ee4a1b2f77b5d3c5efb0e2cade12
-
Filesize
832B
MD5df76155dbd96ed3fba4dae39b11d380a
SHA1b92763f66c212d74ce657d7063b12f037f71911f
SHA256cec520a813dad4bbb36f79d09034dbd2a27fd42d6a26a3697c781600e8b179d7
SHA5126f97a45b6042a1654c85bc9e2c2e6e65c94345a7e77dac442ef20052e0a15adc8f60af2664b3c034d99dd97d46f276183ce80beefc29fd22d6c4de791a93f0b9
-
Filesize
620B
MD5e3a6c856222acceb9bbb3f521b2d6f8a
SHA1cafca047a208fe189513d7c206b453778d0564e1
SHA256994947db4656545c01196676f84e8c1d866938e22986db53792a01c112955559
SHA512bfed69e1c2bde450910651f699474ecaf022bef888db008a51f7ac60c0bba727faf3d5cb9261edc29a781d7791e2a8a5db317edeb4d8996909cf778bc2d429a3
-
Filesize
34B
MD5f93ff4c36dd1a285ee95df1e0ef1b8fb
SHA13997123f4021f55fc184705a59e6a26dc7bafa45
SHA25667e382332542d77877ee8c54e4dc4ba9e4b58330bc68d8d09bb6a7f40b633dd7
SHA512a0ce702eeb5f95cda4c76b001f435191b90ec552d1d4f7d8b9d0cfea528ffbae8913498aae3be53bdd84642bc3516d1c595ebe8d1a7054e6f883d0498088eb1d
-
Filesize
1KB
MD5df7153ef2ec6c9e7e49afd0773b068c8
SHA1639714e6af6d094435dd07aba85da2e211b98b5e
SHA2565380dff333334e37ad7ccfc2136d86610493444aec6a43d8608adc04354bb480
SHA512546861da78339c7cbbd75b3e39a378b8a74bd78b6619356bb5256782a9516aca64c8535274ebe7b3b6d55a2e0f3a86cc0d97591421e096f32615fa6d49413da5