Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe
Resource
win10v2004-20220901-en
General
-
Target
0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe
-
Size
297KB
-
MD5
5956a2ebb351f79b49f373ead4ec1030
-
SHA1
53ceb308c8f636ff1450615b6ec7cebee3ec639d
-
SHA256
0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9
-
SHA512
6c358c614fb8d32b0812872dc607e8ec7b26cbf25b6a71014d1a49a489ac0443f11cc2cc2cecd3adffce3dd153bfc1df97e1f8b5c493cfa1f6eb350fef82c610
-
SSDEEP
6144:g/0uoIkTsxAKunaIjuVUDJ+nlPxeg69VGvHrR9PoN8DcmL:gJQvKukUDJolZp69V2L7Q6DpL
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1384 2.exe 1492 Setup.exe 952 2.exe 1672 SetupZIzK.exe -
Loads dropped DLL 23 IoCs
pid Process 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 1384 2.exe 1384 2.exe 1384 2.exe 1492 Setup.exe 1492 Setup.exe 1492 Setup.exe 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 952 2.exe 952 2.exe 952 2.exe 1672 SetupZIzK.exe 1672 SetupZIzK.exe 1672 SetupZIzK.exe 1512 WerFault.exe 1512 WerFault.exe 1512 WerFault.exe 552 WerFault.exe 552 WerFault.exe 552 WerFault.exe 1512 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\Setup.jpg 2.exe File created C:\program files\common files\microsoft shared\msinfo\SetupZIzK.jpg 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 1512 1492 WerFault.exe 27 552 1672 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1384 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 26 PID 1248 wrote to memory of 1384 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 26 PID 1248 wrote to memory of 1384 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 26 PID 1248 wrote to memory of 1384 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 26 PID 1248 wrote to memory of 1384 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 26 PID 1248 wrote to memory of 1384 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 26 PID 1248 wrote to memory of 1384 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 26 PID 1384 wrote to memory of 1492 1384 2.exe 27 PID 1384 wrote to memory of 1492 1384 2.exe 27 PID 1384 wrote to memory of 1492 1384 2.exe 27 PID 1384 wrote to memory of 1492 1384 2.exe 27 PID 1384 wrote to memory of 1492 1384 2.exe 27 PID 1384 wrote to memory of 1492 1384 2.exe 27 PID 1384 wrote to memory of 1492 1384 2.exe 27 PID 1248 wrote to memory of 952 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 28 PID 1248 wrote to memory of 952 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 28 PID 1248 wrote to memory of 952 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 28 PID 1248 wrote to memory of 952 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 28 PID 1248 wrote to memory of 952 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 28 PID 1248 wrote to memory of 952 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 28 PID 1248 wrote to memory of 952 1248 0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe 28 PID 1492 wrote to memory of 1512 1492 Setup.exe 29 PID 1492 wrote to memory of 1512 1492 Setup.exe 29 PID 1492 wrote to memory of 1512 1492 Setup.exe 29 PID 1492 wrote to memory of 1512 1492 Setup.exe 29 PID 1492 wrote to memory of 1512 1492 Setup.exe 29 PID 1492 wrote to memory of 1512 1492 Setup.exe 29 PID 1492 wrote to memory of 1512 1492 Setup.exe 29 PID 952 wrote to memory of 1672 952 2.exe 30 PID 952 wrote to memory of 1672 952 2.exe 30 PID 952 wrote to memory of 1672 952 2.exe 30 PID 952 wrote to memory of 1672 952 2.exe 30 PID 952 wrote to memory of 1672 952 2.exe 30 PID 952 wrote to memory of 1672 952 2.exe 30 PID 952 wrote to memory of 1672 952 2.exe 30 PID 1672 wrote to memory of 552 1672 SetupZIzK.exe 31 PID 1672 wrote to memory of 552 1672 SetupZIzK.exe 31 PID 1672 wrote to memory of 552 1672 SetupZIzK.exe 31 PID 1672 wrote to memory of 552 1672 SetupZIzK.exe 31 PID 1672 wrote to memory of 552 1672 SetupZIzK.exe 31 PID 1672 wrote to memory of 552 1672 SetupZIzK.exe 31 PID 1672 wrote to memory of 552 1672 SetupZIzK.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe"C:\Users\Admin\AppData\Local\Temp\0cd38cd6408e9b173ea1e354c52f66b04750e2890f5946eeb379bc360a58d5c9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\program files\common files\microsoft shared\msinfo\Setup.exe"C:\program files\common files\microsoft shared\msinfo\Setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 2684⤵
- Loads dropped DLL
- Program crash
PID:1512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:952 -
C:\program files\common files\microsoft shared\msinfo\SetupZIzK.exe"C:\program files\common files\microsoft shared\msinfo\SetupZIzK.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 2684⤵
- Loads dropped DLL
- Program crash
PID:552
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
255KB
MD5219066165af4b3ecbc3d301bbe292bba
SHA1bcb1b053ef49c6df2766f680bfd36db17484b59c
SHA25620310b5a495e9f5895e81df193996506561a165ebb009a0256f331f91532e13e
SHA5127702ececaeb2e077d384d2c0ff631d4488fca96b15416b4eb84506d9d2b93468fc4f5795c18a4451d0d7556188fc924b6e0237e739f250bacbdb4293e28770ad
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c
-
Filesize
274KB
MD520f67f1173d96a96735c7007026218cb
SHA19bf859e448597552402fca7ef1e59ce374607dda
SHA256a524bb7d34274f3e0ad2457a214930255954c79a34e864989c31975edc382b1c
SHA5128925ea8d6a0e17dfe231185babaa84a3d2c1c7c5fa38fbea1e0905b9f1eb1c28fe19772e4e0af3ab85c546bc45bc10fcdc5d8ebf731f4bacb4e559644464fd2c