Analysis
-
max time kernel
152s -
max time network
204s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe
Resource
win10v2004-20220812-en
General
-
Target
2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe
-
Size
123KB
-
MD5
9023fe87594e524cb743689038daa1d0
-
SHA1
e9beebd569fd91ad7fbee9cd6fc31d736be0fc76
-
SHA256
2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b
-
SHA512
e4452210eb19c93e94c7b1a722bd71564cef9e93b723dfddf893bc88f03e50f5dca055d3aca713a083632b9187a738d33497b15aa47d23493130be587dedb459
-
SSDEEP
1536:e76oh6unW1dh3BpdOEeBW8aBFhrRFccloCtjbtXmEi8YJaXX:e704qr3BleB5aBXIcSCNbAlM
Malware Config
Extracted
tofsee
94.242.250.149
91.218.38.245
188.165.132.183
rgtryhbgddtyh.biz
wertdghbyrukl.ch
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1752 vwommgyl.exe -
Deletes itself 1 IoCs
pid Process 1892 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSConfig = "\"C:\\Users\\Admin\\vwommgyl.exe\"" 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1752 set thread context of 1744 1752 vwommgyl.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 1752 vwommgyl.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1804 wrote to memory of 1752 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 27 PID 1804 wrote to memory of 1752 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 27 PID 1804 wrote to memory of 1752 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 27 PID 1804 wrote to memory of 1752 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 27 PID 1752 wrote to memory of 1744 1752 vwommgyl.exe 28 PID 1752 wrote to memory of 1744 1752 vwommgyl.exe 28 PID 1752 wrote to memory of 1744 1752 vwommgyl.exe 28 PID 1752 wrote to memory of 1744 1752 vwommgyl.exe 28 PID 1752 wrote to memory of 1744 1752 vwommgyl.exe 28 PID 1752 wrote to memory of 1744 1752 vwommgyl.exe 28 PID 1804 wrote to memory of 1892 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 30 PID 1804 wrote to memory of 1892 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 30 PID 1804 wrote to memory of 1892 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 30 PID 1804 wrote to memory of 1892 1804 2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe"C:\Users\Admin\AppData\Local\Temp\2fc40cff07f1e60f6aa3c2e2a3d94c6d031573fd7eaddc865d396d3c27da583b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\vwommgyl.exe"C:\Users\Admin\vwommgyl.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:1744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7843.bat" "2⤵
- Deletes itself
PID:1892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302B
MD53011eef8f271d7ae680579fcf869530c
SHA1810e5bdf9c904a6dc27fb40a1943c84198046931
SHA256265d85af8de543dfdcb48668f203d71257af3bcb797759c0a314afef52275364
SHA5128457c9e3552d885b5719fd003a9f13e4a09d467829f8e4ac11d61fe1aa71f896f8cf33688a8f7aeaa226ea3fe4215da575273b1d74640cc12660c2609134c80d
-
Filesize
33.6MB
MD5a480788d8555382d4dc069eaf954416c
SHA16b667eb9bfce96d6795a21806abb8cf4dd23694e
SHA2565090ea3a97d55a752ebf58efab2657cde4eda8ac482ccbd867d2dd36743d11ae
SHA512a679a07fc11c31d78158c62180bd3fc8f18e43b5c28c28e13a1dfc0ed3e01d3fab063a0769e9124d8004f92ee0085ae46db8525ffef4b86feed09c1aad80be05
-
Filesize
33.6MB
MD5a480788d8555382d4dc069eaf954416c
SHA16b667eb9bfce96d6795a21806abb8cf4dd23694e
SHA2565090ea3a97d55a752ebf58efab2657cde4eda8ac482ccbd867d2dd36743d11ae
SHA512a679a07fc11c31d78158c62180bd3fc8f18e43b5c28c28e13a1dfc0ed3e01d3fab063a0769e9124d8004f92ee0085ae46db8525ffef4b86feed09c1aad80be05
-
Filesize
33.6MB
MD5a480788d8555382d4dc069eaf954416c
SHA16b667eb9bfce96d6795a21806abb8cf4dd23694e
SHA2565090ea3a97d55a752ebf58efab2657cde4eda8ac482ccbd867d2dd36743d11ae
SHA512a679a07fc11c31d78158c62180bd3fc8f18e43b5c28c28e13a1dfc0ed3e01d3fab063a0769e9124d8004f92ee0085ae46db8525ffef4b86feed09c1aad80be05
-
Filesize
33.6MB
MD5a480788d8555382d4dc069eaf954416c
SHA16b667eb9bfce96d6795a21806abb8cf4dd23694e
SHA2565090ea3a97d55a752ebf58efab2657cde4eda8ac482ccbd867d2dd36743d11ae
SHA512a679a07fc11c31d78158c62180bd3fc8f18e43b5c28c28e13a1dfc0ed3e01d3fab063a0769e9124d8004f92ee0085ae46db8525ffef4b86feed09c1aad80be05