Analysis
-
max time kernel
153s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe
Resource
win10v2004-20220901-en
General
-
Target
c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe
-
Size
678KB
-
MD5
932eeb5d6401fae58ec8219177c9c520
-
SHA1
07508643763880ea970edf5cd4b7abd466255b41
-
SHA256
c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727
-
SHA512
d37df196ff1e35f6dc89d20d21caca86e078f27f34f1ca7374378c4b2426800c85e6b4a2cc168b2f9ad4717fad03c0954b40b9287382e64fec93a30a45409ca0
-
SSDEEP
12288:OHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:ODgINfAuBcgcZG2uG24MG4Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 840 avbyyqn.exe 1528 ~DFA5C.tmp 1376 akvopon.exe -
Deletes itself 1 IoCs
pid Process 1520 cmd.exe -
Loads dropped DLL 3 IoCs
pid Process 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 840 avbyyqn.exe 1528 ~DFA5C.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe 1376 akvopon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1528 ~DFA5C.tmp -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1340 wrote to memory of 840 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 27 PID 1340 wrote to memory of 840 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 27 PID 1340 wrote to memory of 840 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 27 PID 1340 wrote to memory of 840 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 27 PID 840 wrote to memory of 1528 840 avbyyqn.exe 28 PID 840 wrote to memory of 1528 840 avbyyqn.exe 28 PID 840 wrote to memory of 1528 840 avbyyqn.exe 28 PID 840 wrote to memory of 1528 840 avbyyqn.exe 28 PID 1340 wrote to memory of 1520 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 29 PID 1340 wrote to memory of 1520 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 29 PID 1340 wrote to memory of 1520 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 29 PID 1340 wrote to memory of 1520 1340 c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe 29 PID 1528 wrote to memory of 1376 1528 ~DFA5C.tmp 31 PID 1528 wrote to memory of 1376 1528 ~DFA5C.tmp 31 PID 1528 wrote to memory of 1376 1528 ~DFA5C.tmp 31 PID 1528 wrote to memory of 1376 1528 ~DFA5C.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe"C:\Users\Admin\AppData\Local\Temp\c3498a4d4dacedd1c95c92b6a43251a679208354f078e0a2f6254af3a0b67727.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\avbyyqn.exeC:\Users\Admin\AppData\Local\Temp\avbyyqn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\~DFA5C.tmpC:\Users\Admin\AppData\Local\Temp\~DFA5C.tmp OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\akvopon.exe"C:\Users\Admin\AppData\Local\Temp\akvopon.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- Deletes itself
PID:1520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD551619786dc345c869513d0491a8f9a6e
SHA13ad05744099a4fdb41791da30698ad6a6d1879ea
SHA2567833f6c3672f41d7b7a73641e208b1f184071b95b9d2d9a71b2037a3364d398a
SHA5122ed6676dd3f524675293025a56156c1a6cc1548d5b3cee27d4e178509135ca645c839ecf3576cb096dba2d256c73575edd3783c271341665495acd922dfb6e55
-
Filesize
396KB
MD56687614576858bce101f3bfa201b906c
SHA1948ce97954cc3725a16be9344d9f73028b31d3be
SHA2565536b5825dbdd0ac098242f5c4df2911aaeaaed6294c668e19e1947f618fddd0
SHA512b0fdda6c0821cee92d3800f44ee37be59e10cf65d42c7896eb36015b933954275c7760de20b0619a5fdce9357ac55145c00f73aa9cad68e135760c96fb9964ba
-
Filesize
680KB
MD5c10ca94cb744900b83d2fbb1ec7978bd
SHA1db6cda5378ad0eadc612486202051aea85cb4990
SHA256d08833d45dd08c67999a1a26cfc126b0bc17e7604d0724b61f3dfdeb50815d5e
SHA512895150171d1cf47aeccf43ef6f7143e4428f328bd716a0596b3b401e3733d5f90bab4ad68433925204ef3bb20dda9206618b1497ce5483e9c5f95a5ec9de9ae3
-
Filesize
680KB
MD5c10ca94cb744900b83d2fbb1ec7978bd
SHA1db6cda5378ad0eadc612486202051aea85cb4990
SHA256d08833d45dd08c67999a1a26cfc126b0bc17e7604d0724b61f3dfdeb50815d5e
SHA512895150171d1cf47aeccf43ef6f7143e4428f328bd716a0596b3b401e3733d5f90bab4ad68433925204ef3bb20dda9206618b1497ce5483e9c5f95a5ec9de9ae3
-
Filesize
104B
MD586bb2dbeaef655893262f3c041f6afe2
SHA11b26ff1241c1353bd506c18bd0c11878076ba65d
SHA2564a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2
SHA51258294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31
-
Filesize
480B
MD5dcfb3b6b6c115cb8983a1733b087b41f
SHA1645960bcd5b93b4389cb463fca1c0c275a651a2f
SHA25659cc329d201ee18f1f2e9008f8f93333a3acaed45ff0a143eab9e4ba9ef79a9b
SHA512065d123495fb567913b96810b0a739e5c60dffc60d1742608a664c78f14c064575d4a953eea28892f459647ffd298a8552d72e8b9218b64192a1b82c13abedc3
-
Filesize
682KB
MD5c49079a05c54726e02d50fc1916a8a8f
SHA12fd667cbc414d5005b23985596e5769ea7dbc2d8
SHA256d574b1a11085cca1db8b430e2b21fccd708035e2d59bab521a6bb1fd0f570fd9
SHA5127fbec64ee7952e8416b5dc27470100ca1805fb31a2aad80bcdaa933ef7ad3fd9dcfa3c47786befcec64c96e97a6dfdb0ccded1473b1e0804882a0a3d75f34a89
-
Filesize
396KB
MD56687614576858bce101f3bfa201b906c
SHA1948ce97954cc3725a16be9344d9f73028b31d3be
SHA2565536b5825dbdd0ac098242f5c4df2911aaeaaed6294c668e19e1947f618fddd0
SHA512b0fdda6c0821cee92d3800f44ee37be59e10cf65d42c7896eb36015b933954275c7760de20b0619a5fdce9357ac55145c00f73aa9cad68e135760c96fb9964ba
-
Filesize
680KB
MD5c10ca94cb744900b83d2fbb1ec7978bd
SHA1db6cda5378ad0eadc612486202051aea85cb4990
SHA256d08833d45dd08c67999a1a26cfc126b0bc17e7604d0724b61f3dfdeb50815d5e
SHA512895150171d1cf47aeccf43ef6f7143e4428f328bd716a0596b3b401e3733d5f90bab4ad68433925204ef3bb20dda9206618b1497ce5483e9c5f95a5ec9de9ae3
-
Filesize
682KB
MD5c49079a05c54726e02d50fc1916a8a8f
SHA12fd667cbc414d5005b23985596e5769ea7dbc2d8
SHA256d574b1a11085cca1db8b430e2b21fccd708035e2d59bab521a6bb1fd0f570fd9
SHA5127fbec64ee7952e8416b5dc27470100ca1805fb31a2aad80bcdaa933ef7ad3fd9dcfa3c47786befcec64c96e97a6dfdb0ccded1473b1e0804882a0a3d75f34a89