Overview
overview
10Static
static
document-85285.iso
windows7-x64
3document-85285.iso
windows10-2004-x64
3documents-7847.lnk
windows7-x64
8documents-7847.lnk
windows10-2004-x64
8habitablen...ts.png
windows7-x64
3habitablen...ts.png
windows10-2004-x64
3templates642.dll
windows7-x64
10templates642.dll
windows10-2004-x64
10yurts.cmd
windows7-x64
8yurts.cmd
windows10-2004-x64
8Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-10-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
document-85285.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
document-85285.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
documents-7847.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
documents-7847.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
habitableness_crickets.png
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
habitableness_crickets.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
templates642.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
templates642.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
yurts.cmd
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
yurts.cmd
Resource
win10v2004-20220901-en
General
-
Target
documents-7847.lnk
-
Size
2KB
-
MD5
1364162c7733c1855f0ab20dd96c4de8
-
SHA1
4b7ee7ae44f737efcb16df0c0645ffed02b4e612
-
SHA256
26e3bfd68030ff843260fd5dffe2e2206d4bf02d3dcc22a159262598584e5830
-
SHA512
dbef2720f9a1adb356aba90d51829d48b47a29614893edc347e5937d097e3022d25ad4a2024b0700af1cea2b737f6b9914ffdc52ec5d6d2f862bb060dfd7c021
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1940 forthcame.exe -
Loads dropped DLL 1 IoCs
pid Process 880 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1672 wrote to memory of 880 1672 cmd.exe 28 PID 1672 wrote to memory of 880 1672 cmd.exe 28 PID 1672 wrote to memory of 880 1672 cmd.exe 28 PID 880 wrote to memory of 1612 880 cmd.exe 30 PID 880 wrote to memory of 1612 880 cmd.exe 30 PID 880 wrote to memory of 1612 880 cmd.exe 30 PID 880 wrote to memory of 316 880 cmd.exe 31 PID 880 wrote to memory of 316 880 cmd.exe 31 PID 880 wrote to memory of 316 880 cmd.exe 31 PID 880 wrote to memory of 436 880 cmd.exe 32 PID 880 wrote to memory of 436 880 cmd.exe 32 PID 880 wrote to memory of 436 880 cmd.exe 32 PID 880 wrote to memory of 1040 880 cmd.exe 33 PID 880 wrote to memory of 1040 880 cmd.exe 33 PID 880 wrote to memory of 1040 880 cmd.exe 33 PID 880 wrote to memory of 1940 880 cmd.exe 34 PID 880 wrote to memory of 1940 880 cmd.exe 34 PID 880 wrote to memory of 1940 880 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\documents-7847.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\yurts.cmd" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"3⤵PID:1612
-
-
C:\Windows\system32\xcopy.exexcopy C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\forthcame.exe /h /s /e3⤵PID:316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"3⤵PID:436
-
-
C:\Windows\system32\xcopy.exexcopy templates642.png C:\Users\Admin\AppData\Local\Temp\28434.3357 /h /s /e3⤵PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\forthcame.exeC:\Users\Admin\AppData\Local\Temp\forthcame.exe C:\Users\Admin\AppData\Local\Temp\28434.3357,#13⤵
- Executes dropped EXE
PID:1940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5dd81d91ff3b0763c392422865c9ac12e
SHA1963b55acc8c566876364716d5aafa353995812a8
SHA256f5691b8f200e3196e6808e932630e862f8f26f31cd949981373f23c9d87db8b9
SHA5128a5036ccab9c9e71deb4ecb9598528ca19c2d697a836846d23e1547b24172fa236a798092c7db676929abff830e40f52ce8f3b3bdd8d4c2553d7c021fceaf120
-
Filesize
44KB
MD5dd81d91ff3b0763c392422865c9ac12e
SHA1963b55acc8c566876364716d5aafa353995812a8
SHA256f5691b8f200e3196e6808e932630e862f8f26f31cd949981373f23c9d87db8b9
SHA5128a5036ccab9c9e71deb4ecb9598528ca19c2d697a836846d23e1547b24172fa236a798092c7db676929abff830e40f52ce8f3b3bdd8d4c2553d7c021fceaf120