Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe
Resource
win10v2004-20220812-en
General
-
Target
1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe
-
Size
64KB
-
MD5
4d7980e7f95ae03da2680257e05e69c0
-
SHA1
985aedc05ff725354c12cb63275e19e8b63fa66f
-
SHA256
1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9
-
SHA512
a78059c2bb6d0bdf6f458aacde50393578b9c8e6284c1ffdf5876ae66ca92b46b6d587cee33651b9fac9b38899e4b0e728dbe1340787622e753fa640374aa396
-
SSDEEP
768:CAX45JoF+yMhkA089gH5F5o8AxQWQGPL4vzZq2o9W7GsxBbPr:CLGxMhm8S5o8AxQNGCq2iW7z
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0007000000005c50-54.dat aspack_v212_v242 behavioral1/files/0x0007000000005c50-55.dat aspack_v212_v242 behavioral1/files/0x0007000000005c50-57.dat aspack_v212_v242 behavioral1/files/0x0007000000005c50-59.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2000 UiM.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe 2020 1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe UiM.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe UiM.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE UiM.exe File opened for modification C:\Program Files\7-Zip\7z.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe UiM.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE UiM.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe UiM.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe UiM.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe UiM.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe UiM.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE UiM.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe UiM.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe UiM.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe UiM.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe UiM.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe UiM.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe UiM.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe UiM.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe UiM.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe UiM.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler64.exe UiM.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE UiM.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe UiM.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe UiM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2000 2020 1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe 26 PID 2020 wrote to memory of 2000 2020 1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe 26 PID 2020 wrote to memory of 2000 2020 1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe 26 PID 2020 wrote to memory of 2000 2020 1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe 26 PID 2000 wrote to memory of 924 2000 UiM.exe 29 PID 2000 wrote to memory of 924 2000 UiM.exe 29 PID 2000 wrote to memory of 924 2000 UiM.exe 29 PID 2000 wrote to memory of 924 2000 UiM.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe"C:\Users\Admin\AppData\Local\Temp\1f58aa524c1926e170dad4cfcde354b1d2c76c9653ffbed2ca00806a967de6b9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\UiM.exeC:\Users\Admin\AppData\Local\Temp\UiM.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\230d2afb.bat" "3⤵PID:924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD56800b689bea8dd6f118d73cce7d58d63
SHA1cebb8f108238c4bbda3afbd4bc3c2a41e1f191d0
SHA25661bd1e89a1abf469feabbc96e177b75dc9b2e9a126f24d46c3b35ab360b84be5
SHA512116d14a1e6e0be7f6c5dc296b2dc6adef1e617867369b0090d30b770a41572a927a61c96439c6c5cdb05922e34202b5e8b2f69ed8ee7644e82048f87a2b8c51c
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e