Analysis
-
max time kernel
142s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe
Resource
win10v2004-20220901-en
General
-
Target
e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe
-
Size
279KB
-
MD5
764095681a71843f6557b20b2dd3e610
-
SHA1
df6a41a5a399d8177a653050ed7279deecaf7111
-
SHA256
e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791
-
SHA512
34d8cf50d1a828afb66195de322ff70a846b1ad0e8c353e937bc45a6c84ce0665ada5f68f0b0d9ec2f66d6637c9575319cf855e9104d67b78b47b2c1d8494704
-
SSDEEP
6144:BzfDEaJynqYISIkBKmNU4lTGxyU18cBDPxFbvoasaq09lQkOtqGeb:t2zIpkkOlicUhNbvoIq0YkOtqPb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 592 nsy6212.tmp -
Loads dropped DLL 9 IoCs
pid Process 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 592 nsy6212.tmp 592 nsy6212.tmp 592 nsy6212.tmp 592 nsy6212.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral1/files/0x000a0000000139f7-58.dat nsis_installer_1 behavioral1/files/0x000a0000000139f7-58.dat nsis_installer_2 behavioral1/files/0x000a0000000139f7-60.dat nsis_installer_1 behavioral1/files/0x000a0000000139f7-60.dat nsis_installer_2 behavioral1/files/0x000a0000000139f7-63.dat nsis_installer_1 behavioral1/files/0x000a0000000139f7-63.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 592 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 29 PID 1632 wrote to memory of 592 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 29 PID 1632 wrote to memory of 592 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 29 PID 1632 wrote to memory of 592 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 29 PID 1632 wrote to memory of 592 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 29 PID 1632 wrote to memory of 592 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 29 PID 1632 wrote to memory of 592 1632 e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe"C:\Users\Admin\AppData\Local\Temp\e5fb4dd0e594a7e5505c97f04c81c43cd6f0f1ab42bc0ed715154b4a992ba791.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\nsy6212.tmpC:\Users\Admin\AppData\Local\Temp\nsy6212.tmp /idn2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD58d081fcbec1ca7d30487291a6303d775
SHA165397f9690387db8a9108b16ea2b2d7fca8fbcfd
SHA2560c87d2a2bde94a00dbd13c44686a8b80681857320e46e6bdef0d6060fcd61837
SHA5121f8664883b63cf41eae659b3bffd83f200641d8887dc30f4bdca2a19c30625fd03e3a02cff9138f36b4a215ceba25ee26ec1e675e8be3aa473a2cc5e3c2961f5
-
Filesize
223KB
MD58d081fcbec1ca7d30487291a6303d775
SHA165397f9690387db8a9108b16ea2b2d7fca8fbcfd
SHA2560c87d2a2bde94a00dbd13c44686a8b80681857320e46e6bdef0d6060fcd61837
SHA5121f8664883b63cf41eae659b3bffd83f200641d8887dc30f4bdca2a19c30625fd03e3a02cff9138f36b4a215ceba25ee26ec1e675e8be3aa473a2cc5e3c2961f5
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
223KB
MD58d081fcbec1ca7d30487291a6303d775
SHA165397f9690387db8a9108b16ea2b2d7fca8fbcfd
SHA2560c87d2a2bde94a00dbd13c44686a8b80681857320e46e6bdef0d6060fcd61837
SHA5121f8664883b63cf41eae659b3bffd83f200641d8887dc30f4bdca2a19c30625fd03e3a02cff9138f36b4a215ceba25ee26ec1e675e8be3aa473a2cc5e3c2961f5