Analysis
-
max time kernel
24s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
SOLICITUD DE OFERTA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SOLICITUD DE OFERTA.exe
Resource
win10v2004-20220812-en
General
-
Target
SOLICITUD DE OFERTA.exe
-
Size
411KB
-
MD5
2c42280065c4b3867b6a05a775df165c
-
SHA1
e8499c5ffb03beed273d3ef568d2e4b18ced5c78
-
SHA256
13d90b21a225ff66b005c2f0d70f33bf76e7108f37e383875c814a4cd245b3b4
-
SHA512
8f212bc320f6401489d5870f71a0808f3e6c1d7deefd9020dc8d22e900c83ffc2ec2444e953f961cf9dc5fa232aa5bd6a4b19ae3ad9e0171e088d7f5591b1cff
-
SSDEEP
12288:Agv+XUDfKt2aTbeLludgriTtBTbzA04OiEN/+MLa:Yt1/eLlQxRBXzn45E5C
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3228 SOLICITUD DE OFERTA.exe 3228 SOLICITUD DE OFERTA.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Undiges\Savourless0\Folkeafstemningers.kur SOLICITUD DE OFERTA.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\Dobbeltfejlene\Brugerprogrammers\Resalutes.Emb SOLICITUD DE OFERTA.exe File opened for modification C:\Windows\resources\0409\Economite\Polyribosomal.Dis SOLICITUD DE OFERTA.exe File opened for modification C:\Windows\resources\Coheiress\Emblemizing\Trompeterede.ini SOLICITUD DE OFERTA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 3856 3228 SOLICITUD DE OFERTA.exe 78 PID 3228 wrote to memory of 3856 3228 SOLICITUD DE OFERTA.exe 78 PID 3228 wrote to memory of 3856 3228 SOLICITUD DE OFERTA.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOLICITUD DE OFERTA.exe"C:\Users\Admin\AppData\Local\Temp\SOLICITUD DE OFERTA.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\cmd.execmd /c echo C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Uindfriedes126\Indtrdelsens178\Overdiffusing.Geo2⤵PID:3856
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fc3772787eb239ef4d0399680dcc4343
SHA1db2fa99ec967178cd8057a14a428a8439a961a73
SHA2569b93c61c9d63ef8ec80892cc0e4a0877966dca9b0c3eb85555cebd2ddf4d6eed
SHA51279e491ca4591a5da70116114b7fbb66ee15a0532386035e980c9dfe7afb59b1f9d9c758891e25bfb45c36b07afd3e171bac37a86c887387ef0e80b1eaf296c89
-
Filesize
6KB
MD51b76bca7bef0f515d39f31e3c084f31d
SHA192705562f13db5967e66624286f8291477b7b217
SHA25680b76b73d2d143b5db4e2d2e24438a68647ae96ac37289415c1caef5c2ed63d3
SHA512eab2b02b4bdd421e9f4c8bc3ed42b2ff66cc1a2a7ce93a7fe0174bc92e55a6fbc51c0ea65070603208ffb54330cf3e772db5cc1a6c410efa52697e5f5bcc292d