Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe
Resource
win10v2004-20220901-en
General
-
Target
5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe
-
Size
144KB
-
MD5
5edc21aaa81001e429de1ebad7b72d70
-
SHA1
75fbeb75de9e118ea04884ee88270ea8b238e40c
-
SHA256
5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2
-
SHA512
0c554942fd89e8f2a160fc6cbec75d961de8f62b9deec9d0a05c94bc2113c3772cffb5371d361427b01c60463ad77a9fc5f6738417968652356428c0593e1e4e
-
SSDEEP
3072:bEX9m+KA5vNnmOt3wfFmICh7EvnXZBKFZAAUnjlfZ+gltv8+zV+khcGCH:bQXNmOt3w9C+vXbCCAsjtBv8yV+khh
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000500000000b2d2-57.dat aspack_v212_v242 behavioral1/files/0x000500000000b2d2-55.dat aspack_v212_v242 behavioral1/files/0x000500000000b2d2-54.dat aspack_v212_v242 behavioral1/files/0x000500000000b2d2-59.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1948 TdURMX.exe -
Loads dropped DLL 2 IoCs
pid Process 1444 5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe 1444 5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe TdURMX.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe TdURMX.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe TdURMX.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe TdURMX.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe TdURMX.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe TdURMX.exe File opened for modification C:\Program Files\7-Zip\7zG.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe TdURMX.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe TdURMX.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe TdURMX.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe TdURMX.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE TdURMX.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe TdURMX.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe TdURMX.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe TdURMX.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe TdURMX.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe TdURMX.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE TdURMX.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe TdURMX.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe TdURMX.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe TdURMX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe TdURMX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe TdURMX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1444 5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1444 wrote to memory of 1948 1444 5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe 27 PID 1444 wrote to memory of 1948 1444 5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe 27 PID 1444 wrote to memory of 1948 1444 5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe 27 PID 1444 wrote to memory of 1948 1444 5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe 27 PID 1948 wrote to memory of 1664 1948 TdURMX.exe 30 PID 1948 wrote to memory of 1664 1948 TdURMX.exe 30 PID 1948 wrote to memory of 1664 1948 TdURMX.exe 30 PID 1948 wrote to memory of 1664 1948 TdURMX.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe"C:\Users\Admin\AppData\Local\Temp\5815cf28b2a8d7f68a3df669aa23229ac9606e3d33920c10ce45f9dee1cb1fb2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\TdURMX.exeC:\Users\Admin\AppData\Local\Temp\TdURMX.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7b1a184f.bat" "3⤵PID:1664
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD565db8f19202f6dce383ef388866d2dd3
SHA18e0827c2ce45feda0782e292e8f9c24ea0e32bc0
SHA25660d6ec66a11fa9c7ff89d4d855c39cc249eb042c16a9847b4f8756a5cb2e361f
SHA5126612cc42fe91003ea30ee47d30b1fec6767c1a807ea25a0ed196d75af44796fbf3a274cb9667fe6e311bd0f82e938861b0e9dee8da4526c1dafc2fd25d758a7d
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e