Resubmissions
12/10/2022, 10:16
221012-ma2qradcdp 812/10/2022, 10:12
221012-l8gykadcb6 812/10/2022, 10:07
221012-l5wybadccq 812/10/2022, 09:38
221012-ll9easdbfr 8Analysis
-
max time kernel
397s -
max time network
421s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 09:38
Behavioral task
behavioral1
Sample
3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe
Resource
win10v2004-20220901-en
General
-
Target
3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe
-
Size
1.1MB
-
MD5
56ac9e72644a8dae8c1968d63a26e58a
-
SHA1
d0349d04f33400541898426438d9e036d21decc5
-
SHA256
3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c
-
SHA512
d4f5c176b3e4fda2a318fde3ec3702d9bf102bd752ee42b4549b9fd6630fdcbee20de63fc7a403f60768ac7c0a7d780bc542c8d60f4e2b9eeb19a40aba49ddc1
-
SSDEEP
24576:mq5TfcdHj4fmbi2q+0MmV0VMXeyrtoT1GokHTQoCwsC+Y:mUTsamOx9RoBVoCwT
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 760 dmr_72.exe 1308 dmr_72.exe 580 dmr_72.exe 1396 dmr_72.exe -
resource yara_rule behavioral1/memory/940-55-0x0000000001330000-0x00000000015A6000-memory.dmp upx behavioral1/memory/940-64-0x0000000001330000-0x00000000015A6000-memory.dmp upx behavioral1/memory/1992-86-0x0000000001190000-0x0000000001406000-memory.dmp upx behavioral1/memory/1992-88-0x0000000001190000-0x0000000001406000-memory.dmp upx -
Loads dropped DLL 8 IoCs
pid Process 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/940-64-0x0000000001330000-0x00000000015A6000-memory.dmp autoit_exe behavioral1/memory/1992-86-0x0000000001190000-0x0000000001406000-memory.dmp autoit_exe behavioral1/memory/1992-88-0x0000000001190000-0x0000000001406000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file\shell\edit\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file\shell\open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.dat rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.dat\ = "dat_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\dat_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1064 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1856 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 760 dmr_72.exe Token: 33 288 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 288 AUDIODG.EXE Token: 33 288 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 288 AUDIODG.EXE Token: SeDebugPrivilege 1396 dmr_72.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 760 dmr_72.exe 760 dmr_72.exe 1396 dmr_72.exe 1396 dmr_72.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 940 wrote to memory of 760 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 27 PID 940 wrote to memory of 760 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 27 PID 940 wrote to memory of 760 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 27 PID 940 wrote to memory of 760 940 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 27 PID 1992 wrote to memory of 1396 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 40 PID 1992 wrote to memory of 1396 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 40 PID 1992 wrote to memory of 1396 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 40 PID 1992 wrote to memory of 1396 1992 3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe 40 PID 1856 wrote to memory of 1064 1856 rundll32.exe 43 PID 1856 wrote to memory of 1064 1856 rundll32.exe 43 PID 1856 wrote to memory of 1064 1856 rundll32.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe"C:\Users\Admin\AppData\Local\Temp\3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -72189998 -chipde -e37278fe332e42d1af33e4480ad52248 - -BLUB2 -efxoawmsuueuqdmh -9402⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:760
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:288
-
C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"1⤵
- Executes dropped EXE
PID:1308
-
C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"1⤵
- Executes dropped EXE
PID:580
-
C:\Users\Admin\AppData\Local\Temp\3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe"C:\Users\Admin\AppData\Local\Temp\3db0e385eb53a32d61a5a35908a99317868b571e4cf7079db67fd68604da662c_unpacked.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe"C:\Users\Admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -72189998 -chipde -e37278fe332e42d1af33e4480ad52248 - -BLUB2 -usapwoahdnfdlizi -19922⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1396
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DMR\efxoawmsuueuqdmh.dat1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\DMR\efxoawmsuueuqdmh.dat2⤵
- Opens file in notepad (likely ransom note)
PID:1064
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
163B
MD58c934b48a05955c6cc934925f4c01e7d
SHA1b6300c8e23a440e85637a6e8f028ff25bee676d6
SHA25651be55dd44a7d2c782ef432971878a64040aec99c5ec0b53ac92d72bb2645992
SHA512199896d1482d91a24d896452b1a81b4c717a2781b0261aa7b32bd5fc38cdf84bf000d9487efa6bd799ae5b9b04019f5dd64bb174f5eec285d76aa9d8f3d1aa69
-
Filesize
163B
MD58c934b48a05955c6cc934925f4c01e7d
SHA1b6300c8e23a440e85637a6e8f028ff25bee676d6
SHA25651be55dd44a7d2c782ef432971878a64040aec99c5ec0b53ac92d72bb2645992
SHA512199896d1482d91a24d896452b1a81b4c717a2781b0261aa7b32bd5fc38cdf84bf000d9487efa6bd799ae5b9b04019f5dd64bb174f5eec285d76aa9d8f3d1aa69
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf
-
Filesize
373KB
MD51b81fa48134378f2b8d54a41fcfcf0ca
SHA1ff6fd97bcc603890c9bdffebe992a8b95d4f2686
SHA2565e2931d27098e63b67126ec2e036d8e2f4e46814d8c777c0307e3eec3b947707
SHA512b0a9ae05da6e73729cf61ba7e58015630bd69c508fbfaa8cd6d9d116b63def1c67e7298680aa8d6d99f20d77e91dd14d880466ba21a1062498fdf3687518c8cf