Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05-10-2022 10:44
Static task
static1
General
-
Target
e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe
-
Size
1.0MB
-
MD5
b7857ce68b39934b8f2058fa4348e020
-
SHA1
2fcf50364b2fc27e4859adbd4e0a02a600c079e0
-
SHA256
e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb
-
SHA512
3c7861b36adb535dfdf7a8438ea0ecd6fe6ab78e8deee9b0e805e60dc68744f787ebab00fceb2f830c36a709669cf79b23efd6767a7af3433516372aeed3f7ad
-
SSDEEP
12288:ZpTqX8FsEYd8uU6AxywWy3LGrZtgWS2iNVNhFQVNNeROg9SA1L/xATqjJ5nxKAza:e0W6P10ncOg9SAPrjrxZGsfhbBTd
Malware Config
Extracted
allcome
http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=finarnw
D5c27bWU8dvgdayPUMzKbc75CmsD9aUSDw
r4RkKWPKszhkZVTtXGBDNyrzcDPjpcnGNp
0xC4b495c6ef4B61d5757a1e78dE22edC315867C84
XshLZA5C9odmaiEfopX5DYvwMbnM4hqCME
TT7mceJ6BNhTPFqpaBy1ND1CWGwaGeqhpx
t1MrxfTEGEZioK7qjcDd48KVC5BMk7ccH8B
GCM62OODIUXHYPTVUZT2W4GKPIO7YMLZDNPR4NGUWLBU7KPOU7Q7E44X
48Zvk6W9kfXik8CEscQYjEZdDCVZtXNEGdjczTR4XD9SKfLWkirntGLR7UyhD7aas3C2N3QefcdB4gyLZt93CrmtP5WAeqJ
qz448vxrv9y6lsy0l4y6x98gylykleumxqnqs7fkn6
1AvqxpSfuNooDv2gn8rFNXiWP64bn7m8xa
0x7374d06666974119Fb6C8c1F10D4Ab7eCB724Fcd
LKcXMo6X6jGyk9o9phn4YvYUQ8QVR4wJgo
ronin:bb375c985bc63d448b3bc14cda06b2866f75e342
+79889916188
+79889916188
+79889916188
MJfnNkoXewo8QB5iu9dee2exwdavDxWRLC
ltc1q309prv3k8lc9gqd062eevjvxmkgyv00xe3m6jg
3Gs18Dq8SNrs3kLQdrpUFHa2yX8uD9ZXR7
bc1qhcynpwvj6lvdh393ph8tesk0mljsc6z3y40h2m
89PjhdrngYjeSa8dFeg6q8Sz4BXdrLLP8H8z82eUhTNjPBpTYkr3o6fWnkqng9D5TRaPT4HafXwUTJqcPE8SsbHUK5PM2Qx
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4204 MoUSO.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3488 set thread context of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3240 schtasks.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 3488 wrote to memory of 1340 3488 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 67 PID 1340 wrote to memory of 3240 1340 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 68 PID 1340 wrote to memory of 3240 1340 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 68 PID 1340 wrote to memory of 3240 1340 e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe"C:\Users\Admin\AppData\Local\Temp\e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"3⤵
- Creates scheduled task(s)
PID:3240
-
-
-
C:\Users\Admin\AppData\Local\cache\MoUSO.exeC:\Users\Admin\AppData\Local\cache\MoUSO.exe1⤵
- Executes dropped EXE
PID:4204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5b7857ce68b39934b8f2058fa4348e020
SHA12fcf50364b2fc27e4859adbd4e0a02a600c079e0
SHA256e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb
SHA5123c7861b36adb535dfdf7a8438ea0ecd6fe6ab78e8deee9b0e805e60dc68744f787ebab00fceb2f830c36a709669cf79b23efd6767a7af3433516372aeed3f7ad
-
Filesize
1.0MB
MD5b7857ce68b39934b8f2058fa4348e020
SHA12fcf50364b2fc27e4859adbd4e0a02a600c079e0
SHA256e4c58ca4fe487845e33f4976a92f5d1cab56f3ccfad3aaaeba9ad036dea592fb
SHA5123c7861b36adb535dfdf7a8438ea0ecd6fe6ab78e8deee9b0e805e60dc68744f787ebab00fceb2f830c36a709669cf79b23efd6767a7af3433516372aeed3f7ad