Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-10-2022 21:41
Static task
static1
Behavioral task
behavioral1
Sample
5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe
Resource
win10v2004-20220812-en
General
-
Target
5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe
-
Size
421KB
-
MD5
1fe104c0c6b8e2ff1e6af09d71b2e44e
-
SHA1
913ac9d7c8acf8dc427581605091440bb7f19d98
-
SHA256
5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d
-
SHA512
61d7fc066f9f6d2c919891ffba676b960d9c9be23dfbfabc3837eae89dc9b7bc211727cedd22d336f9b5d163a806b9fdbb653ce4cb51c90af800d8396e35beae
-
SSDEEP
12288:DjODTivE9Gzlr3yPRpb+Wvo3/nZFozAKR4p3:DjOysIhr3ORpbBofZFv7p3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1320 AutoInst.exe -
Loads dropped DLL 4 IoCs
pid Process 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1320 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 28 PID 1960 wrote to memory of 1320 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 28 PID 1960 wrote to memory of 1320 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 28 PID 1960 wrote to memory of 1320 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 28 PID 1960 wrote to memory of 1320 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 28 PID 1960 wrote to memory of 1320 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 28 PID 1960 wrote to memory of 1320 1960 5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe"C:\Users\Admin\AppData\Local\Temp\5374c114d8bcf4258435a2cd76b7e1ad8f922d33bf9c015d15cee68931046b0d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe"C:\Users\Admin\AppData\Local\Temp\7zSF087.tmp\AutoInst.exe"2⤵
- Executes dropped EXE
PID:1320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805KB
MD56709897005120aec5674859cc20b1db3
SHA1d6060f0989d6aea4b51f7dde439ca5a21fbc6639
SHA256ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8
SHA512a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5
-
Filesize
165B
MD5e935d8e5d049a4bc817a754ecac200bd
SHA1aa87ca72a14d826dd0ed5563ba1084fc0b407a50
SHA2568fdb740d34fe42516d9be70fb37969a5d1ebe994c9180c3d76aecf04b96bdb4d
SHA51272dd99d4410955fa47df32f635a2ce379d3d5a8865ae1f60b12787cb904f1881e79bd129a8d05e5d5d3f271592c7b7b8e512ae3e0977197497a343ca4de89984
-
Filesize
805KB
MD56709897005120aec5674859cc20b1db3
SHA1d6060f0989d6aea4b51f7dde439ca5a21fbc6639
SHA256ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8
SHA512a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5
-
Filesize
805KB
MD56709897005120aec5674859cc20b1db3
SHA1d6060f0989d6aea4b51f7dde439ca5a21fbc6639
SHA256ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8
SHA512a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5
-
Filesize
805KB
MD56709897005120aec5674859cc20b1db3
SHA1d6060f0989d6aea4b51f7dde439ca5a21fbc6639
SHA256ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8
SHA512a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5
-
Filesize
805KB
MD56709897005120aec5674859cc20b1db3
SHA1d6060f0989d6aea4b51f7dde439ca5a21fbc6639
SHA256ebddf94172297bcf26fb6142f599de1facb43ab81e8fdf0d83fa79ad2f7ff5c8
SHA512a753ff5121b2c64d473542bee51a90bb953e65879c9cd44812b4b0fd921aa7e19012341b05ccf6fd58c05c3f34715b671c6924526c165ba2aaf3804eb0b421b5