Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 16:30
Static task
static1
Behavioral task
behavioral1
Sample
45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe
Resource
win10v2004-20220901-en
General
-
Target
45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe
-
Size
248KB
-
MD5
9247ad13749929716a66eda778c88540
-
SHA1
67a20e6651841a5e0067a2ce6b925df9b4060cc4
-
SHA256
45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b
-
SHA512
22afaaa99d181a913449a37f4d1cef8e84b78420b844a2ec466da22f05bf2dfb1ba76fbfede3439934fbef1c8be1fb11cff367d2f9f6a59866ad525416f96ace
-
SSDEEP
1536:BHdzhnsTe/Koejg1bykBiMTKWNkTXCoSGbFtBu8cP/a6zm8jeR2qeBgsetxAA27n:ldzRsirqgAkbKW0rbFDSy0tVVet6A2Q2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1356 killa.exe -
Deletes itself 1 IoCs
pid Process 1356 killa.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\killa.exe 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe File opened for modification C:\Windows\killa.exe 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 560 wrote to memory of 1356 560 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe 28 PID 560 wrote to memory of 1356 560 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe 28 PID 560 wrote to memory of 1356 560 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe 28 PID 560 wrote to memory of 1356 560 45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe"C:\Users\Admin\AppData\Local\Temp\45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\killa.exe"C:\Windows\killa.exe" 2C:\Users\Admin\AppData\Local\Temp\45422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:1356
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD59247ad13749929716a66eda778c88540
SHA167a20e6651841a5e0067a2ce6b925df9b4060cc4
SHA25645422a73d79f39c9962cf634929cca9f0a187fcc5a5c51374c461ba4058a789b
SHA51222afaaa99d181a913449a37f4d1cef8e84b78420b844a2ec466da22f05bf2dfb1ba76fbfede3439934fbef1c8be1fb11cff367d2f9f6a59866ad525416f96ace