Analysis
-
max time kernel
74s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe
Resource
win10v2004-20220812-en
General
-
Target
54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe
-
Size
180KB
-
MD5
472a3300b7fb4060cbad0fcba5d99460
-
SHA1
1f433a46b4e26879e6aff56446b9ad08c678af02
-
SHA256
54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0
-
SHA512
a28cb6b378681453cc766539998ac062e1344f8d0cff7bc8e61ed0efef164bde8c541ab273b63727afe31efdfcfdffc7c936ad7942fc5d8a983fc32bbc5982f1
-
SSDEEP
3072:fBAp5XhKpN4eOyVTGfhEClj8jTk+0hD+V64pfPFtlY:ibXE9OiTGfhEClq9VzfPFPY
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1788 WScript.exe 7 1788 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\kandyvi\ebi_manya_kon.rud 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe File opened for modification C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\ebi_manya_kon\so_my_name_is_brus_dick.bat 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe File opened for modification C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\kandyvi\krasota_ta_kakaya.vbs 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe File opened for modification C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\kandyvi\prich4ki_pouuuuut.vbs 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1416 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 26 PID 1160 wrote to memory of 1416 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 26 PID 1160 wrote to memory of 1416 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 26 PID 1160 wrote to memory of 1416 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 26 PID 1160 wrote to memory of 1456 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 28 PID 1160 wrote to memory of 1456 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 28 PID 1160 wrote to memory of 1456 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 28 PID 1160 wrote to memory of 1456 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 28 PID 1160 wrote to memory of 1788 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 29 PID 1160 wrote to memory of 1788 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 29 PID 1160 wrote to memory of 1788 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 29 PID 1160 wrote to memory of 1788 1160 54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe"C:\Users\Admin\AppData\Local\Temp\54cbc8e6854f25c1e7fa190b8d4458e79a95f44cbb862b626ddeae7949c27be0.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\ebi_manya_kon\so_my_name_is_brus_dick.bat" "2⤵
- Drops file in Drivers directory
PID:1416
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\kandyvi\krasota_ta_kakaya.vbs"2⤵
- Drops file in Drivers directory
PID:1456
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\na ulissdfsdf\take me devo4ka\kandyvi\prich4ki_pouuuuut.vbs"2⤵
- Blocklisted process makes network request
PID:1788
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51d1626d011dc2661ec722c9f2ea2eec4
SHA16b69f428fc7968443f027dd450e929c77e955fcb
SHA256ce1d9d4790f36cf844a5bad5f9bf0260d25166a4df7c489f290cd0770e60cf00
SHA512e9ab4adf8e3e1fb95982bc632a75345f6a9b9f450bdb510026f8c7e27d9db58fcbb7ed4f3b8c63178401e6eeb580afdc06a1605d413dba08b9cfabf36d185ba4
-
Filesize
33B
MD5c7e23fded201c85552ed2c02567e8289
SHA1ea05abe3759daf7b38952ed1415357aa1eda7107
SHA25646a3aa0f67b5c73e3bf11de97e4e2a5d859f7d9ef7b0cc307ff982f591ff15a0
SHA5124fa82657b1a4483784559671f4221ff35919b7f26f6faa3d3cdd46d42e09f8d014c38df5e6da9ff20d8c0f670d830f1d2997424af26ccf25bd99b5d8c1228440
-
Filesize
909B
MD57b492ffa8638ebfec98dc28d94d40b50
SHA1b1c0142200aaecaa0ec81d915879265be6e429cb
SHA25673ef3bffc757aa3b8b181a92a08f0c525996bac3a51935200690ac77e8e7be57
SHA512be1b3563fc5c8b9c918ee217881bf00fdf4040d311dcca6a856526a5583e2dc538d86c25946dc30f19e02f2708e8bc2c28d645a7934b7f189a30f2556f67c77b
-
Filesize
635B
MD5a2d2ec3d8447064be489ff80607614eb
SHA115aa84b1a47f8f9c1a634bf0491172520008a3c7
SHA2561e27c6d0bf78023e7156a02da0f5d91f6380e3caeca3b14b978c00de52c21969
SHA5125a0d105f02b987706d869234bb8634cef297308463403fafaaa651e4f931bc59ee74ac1cb47b92390a0d1cb03d856372a6d55af3eb830fef4d44708c8a980530
-
Filesize
1KB
MD53bfa0bc8b2e49a940bf6bd7e2fc910d3
SHA14973f24612f51dd293422a9ee5f3e291b4cae872
SHA25667746cdadd6f848fc3ac24993afd230a8b0a9b6655fcc3954fd8d5b926976e5b
SHA51286516cf4a74fa3975c5a448ee319c3a82b86b340bb2031204da552596feba45fca680e9418fc8e812d05b44556686e5c7ca6f5b441e4e25f485334778296ea6c