Analysis
-
max time kernel
60s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
6FBF058C7A5C8B8889B6D3B043C956E3.exe
Resource
win7-20220901-en
General
-
Target
6FBF058C7A5C8B8889B6D3B043C956E3.exe
-
Size
5.4MB
-
MD5
6fbf058c7a5c8b8889b6d3b043c956e3
-
SHA1
4019f8bbeb202b7fc0a8c4647ada383139c0f02c
-
SHA256
3519c802164ad7fbb26b86834083ecc83039f05fdd2915a8e54091461629b08a
-
SHA512
a3547f66fc7f52a7f75fd69f4cf80a9c4aa8ff02b62d6d862d08b0a6057e6d95a7b5bbaac21c0cb33708e668a7c9fe5a6820bd031bc08725964474a6a4d00ec1
-
SSDEEP
98304:ZaURnsjfaRQghRWff5j/R0UMz/R0UMr/R0UMw/R0UM0:ZznsjfsvQBD2UMT2UMb2UMA2UM0
Malware Config
Extracted
vidar
55
1636
https://t.me/dghzq
https://t.me/zjsqpz
https://t.me/fqwexzq
-
profile_id
1636
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2040 R4CE9-82A5-E8F6D7A.exe 276 R4CE9-82A5-E8F6D7A.exe -
Loads dropped DLL 2 IoCs
pid Process 1204 6FBF058C7A5C8B8889B6D3B043C956E3.exe 1204 6FBF058C7A5C8B8889B6D3B043C956E3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 276 2040 R4CE9-82A5-E8F6D7A.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2040 1204 6FBF058C7A5C8B8889B6D3B043C956E3.exe 28 PID 1204 wrote to memory of 2040 1204 6FBF058C7A5C8B8889B6D3B043C956E3.exe 28 PID 1204 wrote to memory of 2040 1204 6FBF058C7A5C8B8889B6D3B043C956E3.exe 28 PID 1204 wrote to memory of 2040 1204 6FBF058C7A5C8B8889B6D3B043C956E3.exe 28 PID 2040 wrote to memory of 276 2040 R4CE9-82A5-E8F6D7A.exe 29 PID 2040 wrote to memory of 276 2040 R4CE9-82A5-E8F6D7A.exe 29 PID 2040 wrote to memory of 276 2040 R4CE9-82A5-E8F6D7A.exe 29 PID 2040 wrote to memory of 276 2040 R4CE9-82A5-E8F6D7A.exe 29 PID 2040 wrote to memory of 276 2040 R4CE9-82A5-E8F6D7A.exe 29 PID 2040 wrote to memory of 276 2040 R4CE9-82A5-E8F6D7A.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6FBF058C7A5C8B8889B6D3B043C956E3.exe"C:\Users\Admin\AppData\Local\Temp\6FBF058C7A5C8B8889B6D3B043C956E3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Roaming\DIO CONSALTING\CE9-82A5-E8F6D7A\R4CE9-82A5-E8F6D7A.exe"C:\Users\Admin\AppData\Roaming\DIO CONSALTING\CE9-82A5-E8F6D7A\R4CE9-82A5-E8F6D7A.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\DIO CONSALTING\CE9-82A5-E8F6D7A\R4CE9-82A5-E8F6D7A.exe"C:\Users\Admin\AppData\Roaming\DIO CONSALTING\CE9-82A5-E8F6D7A\R4CE9-82A5-E8F6D7A.exe"3⤵
- Executes dropped EXE
PID:276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD56b1face6b1df57abdcdd51fdf3440e49
SHA14fdf141fb23faed163f08058720d208ec616f432
SHA256f414b58167438e77909afa13c1e137874fb7aad4983d30cd9b769f205ace0078
SHA512b5d17e5a4e8cf43019a16cc55914c7e0a37cfad45020105389ad590438488d35a0cb28e3d2e02e682277ab25afaa0f4a75a6e7da8374572ba64e6cc41a8b9021
-
Filesize
515KB
MD56b1face6b1df57abdcdd51fdf3440e49
SHA14fdf141fb23faed163f08058720d208ec616f432
SHA256f414b58167438e77909afa13c1e137874fb7aad4983d30cd9b769f205ace0078
SHA512b5d17e5a4e8cf43019a16cc55914c7e0a37cfad45020105389ad590438488d35a0cb28e3d2e02e682277ab25afaa0f4a75a6e7da8374572ba64e6cc41a8b9021
-
Filesize
515KB
MD56b1face6b1df57abdcdd51fdf3440e49
SHA14fdf141fb23faed163f08058720d208ec616f432
SHA256f414b58167438e77909afa13c1e137874fb7aad4983d30cd9b769f205ace0078
SHA512b5d17e5a4e8cf43019a16cc55914c7e0a37cfad45020105389ad590438488d35a0cb28e3d2e02e682277ab25afaa0f4a75a6e7da8374572ba64e6cc41a8b9021
-
Filesize
515KB
MD56b1face6b1df57abdcdd51fdf3440e49
SHA14fdf141fb23faed163f08058720d208ec616f432
SHA256f414b58167438e77909afa13c1e137874fb7aad4983d30cd9b769f205ace0078
SHA512b5d17e5a4e8cf43019a16cc55914c7e0a37cfad45020105389ad590438488d35a0cb28e3d2e02e682277ab25afaa0f4a75a6e7da8374572ba64e6cc41a8b9021
-
Filesize
515KB
MD56b1face6b1df57abdcdd51fdf3440e49
SHA14fdf141fb23faed163f08058720d208ec616f432
SHA256f414b58167438e77909afa13c1e137874fb7aad4983d30cd9b769f205ace0078
SHA512b5d17e5a4e8cf43019a16cc55914c7e0a37cfad45020105389ad590438488d35a0cb28e3d2e02e682277ab25afaa0f4a75a6e7da8374572ba64e6cc41a8b9021