Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe
Resource
win10v2004-20220812-en
General
-
Target
bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe
-
Size
24KB
-
MD5
2213f440ce4b43e3d19959f4bdfd6500
-
SHA1
a5701c3939f4c459d09649ee9646054ecceba724
-
SHA256
bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44
-
SHA512
184bdc61ec762035a81dfa6bfe46583a8e05c81798d331a6298c6292b576dbc19a20caf5be81d206d124d5835064179db5bc1f89808f8a50ead3bc34e343105b
-
SSDEEP
384:bXvr/G9K/aASCjr8bfCmIyCl/wI0/1YTrfjkC+I3K:b/zG9lCapIyMdnfjMI6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1992 hots.exe -
Loads dropped DLL 2 IoCs
pid Process 1764 bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe 1764 bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1764 bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe 1992 hots.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1992 1764 bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe 26 PID 1764 wrote to memory of 1992 1764 bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe 26 PID 1764 wrote to memory of 1992 1764 bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe 26 PID 1764 wrote to memory of 1992 1764 bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe"C:\Users\Admin\AppData\Local\Temp\bc32e0a1b8df040f6fc8ef4386315d8a137e78b65d1aca90ecbcc1115d6a1c44.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\hots.exe"C:\Users\Admin\AppData\Local\Temp\hots.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD54f92fe5b8c9b051ded2db041115f21b7
SHA12795f0983765391572ab1952408e4e4ae77bd2f0
SHA2563eec46cad72281001bbd36b4a9102e45c5bcb9ada94ff6d0327f5d954fdd1fd2
SHA5122e5494a5ca757c90a27dfd0bf5d7a9909ae11ab800ced28ede82a583bd36093852a202e66de7b48a3f9149f4158acabd8824c4b5862ea1b5cde48fae0b8b92e1
-
Filesize
24KB
MD54f92fe5b8c9b051ded2db041115f21b7
SHA12795f0983765391572ab1952408e4e4ae77bd2f0
SHA2563eec46cad72281001bbd36b4a9102e45c5bcb9ada94ff6d0327f5d954fdd1fd2
SHA5122e5494a5ca757c90a27dfd0bf5d7a9909ae11ab800ced28ede82a583bd36093852a202e66de7b48a3f9149f4158acabd8824c4b5862ea1b5cde48fae0b8b92e1
-
Filesize
24KB
MD54f92fe5b8c9b051ded2db041115f21b7
SHA12795f0983765391572ab1952408e4e4ae77bd2f0
SHA2563eec46cad72281001bbd36b4a9102e45c5bcb9ada94ff6d0327f5d954fdd1fd2
SHA5122e5494a5ca757c90a27dfd0bf5d7a9909ae11ab800ced28ede82a583bd36093852a202e66de7b48a3f9149f4158acabd8824c4b5862ea1b5cde48fae0b8b92e1
-
Filesize
24KB
MD54f92fe5b8c9b051ded2db041115f21b7
SHA12795f0983765391572ab1952408e4e4ae77bd2f0
SHA2563eec46cad72281001bbd36b4a9102e45c5bcb9ada94ff6d0327f5d954fdd1fd2
SHA5122e5494a5ca757c90a27dfd0bf5d7a9909ae11ab800ced28ede82a583bd36093852a202e66de7b48a3f9149f4158acabd8824c4b5862ea1b5cde48fae0b8b92e1