Analysis
-
max time kernel
126s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe
Resource
win10v2004-20220812-en
General
-
Target
1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe
-
Size
112KB
-
MD5
633916351d1724c5dee57d31ee60adb6
-
SHA1
fddbffaf67742208cad9036564acdae7520d3390
-
SHA256
1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1
-
SHA512
32364dd7dcda32dc3148bc724282fea427494eaa3045096749f68479cd7eb3c2842290cb72b9de0c33965d453cb4792ee17874d6b27f9238cecc2e968afb1977
-
SSDEEP
3072:gjgRyvXEFiKfQ15q4Qe4FVwtwwgs4XBcO4:HRGX4kC1eZ6w
Malware Config
Extracted
tofsee
111.121.193.238
188.190.114.19
103.244.1.233
188.165.132.183
213.155.0.208
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 888 jszglwab.exe -
Deletes itself 1 IoCs
pid Process 948 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\jszglwab.exe\"" 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1388 set thread context of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 432 PING.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 888 jszglwab.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1388 wrote to memory of 1352 1388 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 26 PID 1352 wrote to memory of 888 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 27 PID 1352 wrote to memory of 888 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 27 PID 1352 wrote to memory of 888 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 27 PID 1352 wrote to memory of 888 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 27 PID 1352 wrote to memory of 948 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 28 PID 1352 wrote to memory of 948 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 28 PID 1352 wrote to memory of 948 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 28 PID 1352 wrote to memory of 948 1352 1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe 28 PID 948 wrote to memory of 432 948 cmd.exe 30 PID 948 wrote to memory of 432 948 cmd.exe 30 PID 948 wrote to memory of 432 948 cmd.exe 30 PID 948 wrote to memory of 432 948 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe"C:\Users\Admin\AppData\Local\Temp\1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe"C:\Users\Admin\AppData\Local\Temp\1f6a39c4520debfe0f31de642611dfe844c67eb5fc7b4af138df9c6b191a14a1.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\jszglwab.exe"C:\Users\Admin\jszglwab.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:888
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2156.bat" "3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:432
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD528ebcf90a0314c23eca83289a22c4885
SHA17f767297080b0bbd63006737c41e1d63ce16fbf9
SHA25666d20c8befd9993d0a4d6eed18ce10e4572b3bcbf1375088db6b3b8ef0653c6c
SHA512582f3da8ca8ae7f47b1f3c988f84772c2d132d03ac68bd524076acad800ff2927aba7336050399015fc01883fb0259fdf068e199f79a7cec3c9670a887429276
-
Filesize
40.3MB
MD5b2cf0a75dadbcd1f3eb393ddcf01cc8f
SHA1f58f6b4782903a955eae38b8c3b1f5aa8be86c10
SHA256b2b8730dddaa40eb47df5d6f079d37914c2ef28a6c4b2a3bf1a05cdef4563383
SHA512d2dcf875f93fb658c7d037db1b5a743a7bc5df75b6c9d768269496f5f18e19ed78c09dd513e389947029481812fdb6cdd9caf61999d587332180bfd8eabbc5f4
-
Filesize
40.3MB
MD5b2cf0a75dadbcd1f3eb393ddcf01cc8f
SHA1f58f6b4782903a955eae38b8c3b1f5aa8be86c10
SHA256b2b8730dddaa40eb47df5d6f079d37914c2ef28a6c4b2a3bf1a05cdef4563383
SHA512d2dcf875f93fb658c7d037db1b5a743a7bc5df75b6c9d768269496f5f18e19ed78c09dd513e389947029481812fdb6cdd9caf61999d587332180bfd8eabbc5f4
-
Filesize
40.3MB
MD5b2cf0a75dadbcd1f3eb393ddcf01cc8f
SHA1f58f6b4782903a955eae38b8c3b1f5aa8be86c10
SHA256b2b8730dddaa40eb47df5d6f079d37914c2ef28a6c4b2a3bf1a05cdef4563383
SHA512d2dcf875f93fb658c7d037db1b5a743a7bc5df75b6c9d768269496f5f18e19ed78c09dd513e389947029481812fdb6cdd9caf61999d587332180bfd8eabbc5f4