Analysis
-
max time kernel
42s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/10/2022, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
DK.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DK.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
moccasin/dredgers.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
moccasin/dredgers.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
moccasin/released.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
moccasin/released.cmd
Resource
win10v2004-20220901-en
General
-
Target
DK.lnk
-
Size
1KB
-
MD5
985079fc2814a376dd9515920d729df1
-
SHA1
e6ee9a1ff995b60346029fc72e8a722f4cd80638
-
SHA256
d86f477fae6eed053e92c99b66e314197edeccb480657799843debf8905679ae
-
SHA512
de953e861be7c42173805eb7047b9e153bc8e3da4aae1d7a9d136a2e8099b3033f90224da51d30b9842cc7573f4512dbfee8595ea3ce7a30f06c4c84e9de3ee7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 524 constitutionalBeeswax.com -
Loads dropped DLL 1 IoCs
pid Process 1472 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 968 wrote to memory of 1472 968 cmd.exe 28 PID 968 wrote to memory of 1472 968 cmd.exe 28 PID 968 wrote to memory of 1472 968 cmd.exe 28 PID 1472 wrote to memory of 524 1472 cmd.exe 29 PID 1472 wrote to memory of 524 1472 cmd.exe 29 PID 1472 wrote to memory of 524 1472 cmd.exe 29 PID 524 wrote to memory of 1284 524 constitutionalBeeswax.com 30 PID 524 wrote to memory of 1284 524 constitutionalBeeswax.com 30 PID 524 wrote to memory of 1284 524 constitutionalBeeswax.com 30 PID 524 wrote to memory of 1284 524 constitutionalBeeswax.com 30 PID 524 wrote to memory of 1284 524 constitutionalBeeswax.com 30 PID 524 wrote to memory of 1284 524 constitutionalBeeswax.com 30 PID 524 wrote to memory of 1284 524 constitutionalBeeswax.com 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DK.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c moccasin\released.cmd re g2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\constitutionalBeeswax.comC:\Users\Admin\AppData\Local\Temp\\constitutionalBeeswax.com moccasin\dredgers.dat3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\regsvr32.exemoccasin\dredgers.dat4⤵PID:1284
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198
-
Filesize
19KB
MD559bce9f07985f8a4204f4d6554cff708
SHA1645c424974fbe5fe7a04cac73f1c23c96e1570b8
SHA256ca24aef558647274d019dfb4d7fd1506d84ec278795c30ba53b81bb36130dc57
SHA5123cf5825a9c7fb80ea0bd36775a92d07f34cd3709ed2c7c8f500f1c8baa5242768f6d575bd2477b77e3f177e7a4994d5c5bddb24c6eb43b60a6bd83ea026a8198