Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 00:05
Static task
static1
Behavioral task
behavioral1
Sample
221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe
Resource
win10v2004-20220901-en
General
-
Target
221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe
-
Size
113KB
-
MD5
90c2a9548aed055d6f63d6d7179bf170
-
SHA1
329a45a47ac5c860812afb110a28bfb0ebc016c7
-
SHA256
221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb
-
SHA512
cb309c8ff6bd369788ac3ef4da62e84b7706b76f6ed9fbacf701eb214e18320f1bd26b7bf3451348826261f3e1d46fed4f901bceaade35f452f62af184146891
-
SSDEEP
1536:kpgpHzb9dZVX9fHMvG0D3XJNgnDuGCHG7aXRTOcVf22IfbmH:SgXdZt9P6D3XJNgnDuGCHG7aXRCRfiH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 320 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 320 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 26 PID 2016 wrote to memory of 320 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 26 PID 2016 wrote to memory of 320 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 26 PID 2016 wrote to memory of 320 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 26 PID 2016 wrote to memory of 320 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 26 PID 2016 wrote to memory of 320 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 26 PID 2016 wrote to memory of 320 2016 221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe"C:\Users\Admin\AppData\Local\Temp\221376312299a3a13bd9478d969cd09e5c3035803efba33ce413a66c366594eb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\nsj2E34.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\nsj2E34.tmp\setup.exe2⤵
- Executes dropped EXE
PID:320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD53d97290e09b37f11c0c11efa581c9305
SHA191bca15a09fccd0021ce8ce3c5389e8ffba4c5bf
SHA25612624658f24dd0aa83b83b9ccd28a59af908768b83e96ff9f64f6043a7017be5
SHA5120ec7fbbc131c6c387b05650355204b75ba4e1a065df2c52ac196dda433f90baa8707c275e64f0a7d9ee3fc1b229ce19269ee47cb55827c210bb49e7f297241df
-
Filesize
27KB
MD53d97290e09b37f11c0c11efa581c9305
SHA191bca15a09fccd0021ce8ce3c5389e8ffba4c5bf
SHA25612624658f24dd0aa83b83b9ccd28a59af908768b83e96ff9f64f6043a7017be5
SHA5120ec7fbbc131c6c387b05650355204b75ba4e1a065df2c52ac196dda433f90baa8707c275e64f0a7d9ee3fc1b229ce19269ee47cb55827c210bb49e7f297241df
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
27KB
MD53d97290e09b37f11c0c11efa581c9305
SHA191bca15a09fccd0021ce8ce3c5389e8ffba4c5bf
SHA25612624658f24dd0aa83b83b9ccd28a59af908768b83e96ff9f64f6043a7017be5
SHA5120ec7fbbc131c6c387b05650355204b75ba4e1a065df2c52ac196dda433f90baa8707c275e64f0a7d9ee3fc1b229ce19269ee47cb55827c210bb49e7f297241df