Analysis
-
max time kernel
182s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe
Resource
win10v2004-20220901-en
General
-
Target
5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe
-
Size
434KB
-
MD5
5ae68f6dd3cd6981e743e7effbe97a60
-
SHA1
93e1b4f03cb999597b12b2767ea5d195126b1474
-
SHA256
5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146
-
SHA512
3f52774d53150ebe4614b2a0fe5361128550634f20ac3abe8adac279574ddbc68efb634bb2d3b7692412e4bddfe311bc80e6986d756b1370531c3b2a0a45f37b
-
SSDEEP
12288:ZVnQ+IEGpzK6FSkFvqRjrK5Kb/sVId/7:Q5pzv2rKYbE67
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-58.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-55.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-60.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1788 EtflKT.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE EtflKT.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe EtflKT.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe EtflKT.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-hang-ui.exe EtflKT.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\chrome_installer.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE EtflKT.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe EtflKT.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe EtflKT.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE EtflKT.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe EtflKT.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE EtflKT.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe EtflKT.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe EtflKT.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE EtflKT.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe EtflKT.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe EtflKT.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe EtflKT.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe EtflKT.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe EtflKT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe EtflKT.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe EtflKT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE EtflKT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1836 1716 WerFault.exe 15 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1788 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 28 PID 1716 wrote to memory of 1788 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 28 PID 1716 wrote to memory of 1788 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 28 PID 1716 wrote to memory of 1788 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 28 PID 1716 wrote to memory of 1836 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 30 PID 1716 wrote to memory of 1836 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 30 PID 1716 wrote to memory of 1836 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 30 PID 1716 wrote to memory of 1836 1716 5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe 30 PID 1788 wrote to memory of 632 1788 EtflKT.exe 32 PID 1788 wrote to memory of 632 1788 EtflKT.exe 32 PID 1788 wrote to memory of 632 1788 EtflKT.exe 32 PID 1788 wrote to memory of 632 1788 EtflKT.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe"C:\Users\Admin\AppData\Local\Temp\5924ff9e7f99369c1415abdd8c5239b0487f403537a72cc15a390c337798e146.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\EtflKT.exeC:\Users\Admin\AppData\Local\Temp\EtflKT.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ad03a0d.bat" "3⤵PID:632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 1682⤵
- Program crash
PID:1836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5ed98d82a8cd03c8ff7f52f64d963fd26
SHA1e176d58b54a3d543e239623962735cc00fda805e
SHA2568bf3f0c8f58bbd6c403877cdb9046923efb7da0701e11ae3ea3029953472d244
SHA5122366bf378c84580431ab56530b9ef456e0c0339af14c0dc8405a290df595c2d24f304bad1fbb8ea83f75cfeb6a13643470a1641fb2c1a07301182981c5d906de
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e