Analysis
-
max time kernel
134s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 22:27
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
744KB
-
MD5
9a38ae7a6eea4bafd0abd6b9ef85430b
-
SHA1
39977abea4b0c938f55b8b966ad57344ea511756
-
SHA256
c272cea2f8c2ddc5c1fbc41da1194aa8546d3927f1508138b459e9677667b4aa
-
SHA512
a2bae9b26940d2a16c61d68b63e6b7268307650d2ebc7df2bed14d9ac899cf0d713d5cf9fcde4c713e3f5eebb66eca015ed2fb7d0d04c78fbd9510d1231589e8
-
SSDEEP
12288:w1NWl6sZ9rUNeOz6rvonkJpxewNQiTmlqoJBZchQE67WorXHcIx6h3iOttj8kEcc:4Ji9rUNnz6rvcuvZzTmlqojCxorXrmSd
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1976 rite.exe 1188 cgminer.exe 1720 minerd.exe -
resource yara_rule behavioral1/files/0x000a000000012307-67.dat upx behavioral1/files/0x000a000000012307-70.dat upx behavioral1/files/0x000a000000012307-66.dat upx behavioral1/memory/1976-72-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Loads dropped DLL 8 IoCs
pid Process 396 cmd.exe 1908 cmd.exe 1752 cmd.exe 1752 cmd.exe 1908 cmd.exe 1720 minerd.exe 1720 minerd.exe 1720 minerd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Trojan-Ransom.Win32.Blocker.exe" reg.exe -
Kills process with taskkill 4 IoCs
pid Process 1816 taskkill.exe 1820 taskkill.exe 1504 taskkill.exe 1072 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1808 reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 1072 taskkill.exe Token: SeDebugPrivilege 1820 taskkill.exe Token: SeDebugPrivilege 1504 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 620 Trojan-Ransom.Win32.Blocker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 620 wrote to memory of 1188 620 Trojan-Ransom.Win32.Blocker.exe 27 PID 620 wrote to memory of 1188 620 Trojan-Ransom.Win32.Blocker.exe 27 PID 620 wrote to memory of 1188 620 Trojan-Ransom.Win32.Blocker.exe 27 PID 620 wrote to memory of 1188 620 Trojan-Ransom.Win32.Blocker.exe 27 PID 620 wrote to memory of 1252 620 Trojan-Ransom.Win32.Blocker.exe 28 PID 620 wrote to memory of 1252 620 Trojan-Ransom.Win32.Blocker.exe 28 PID 620 wrote to memory of 1252 620 Trojan-Ransom.Win32.Blocker.exe 28 PID 620 wrote to memory of 1252 620 Trojan-Ransom.Win32.Blocker.exe 28 PID 620 wrote to memory of 676 620 Trojan-Ransom.Win32.Blocker.exe 30 PID 620 wrote to memory of 676 620 Trojan-Ransom.Win32.Blocker.exe 30 PID 620 wrote to memory of 676 620 Trojan-Ransom.Win32.Blocker.exe 30 PID 620 wrote to memory of 676 620 Trojan-Ransom.Win32.Blocker.exe 30 PID 620 wrote to memory of 1904 620 Trojan-Ransom.Win32.Blocker.exe 32 PID 620 wrote to memory of 1904 620 Trojan-Ransom.Win32.Blocker.exe 32 PID 620 wrote to memory of 1904 620 Trojan-Ransom.Win32.Blocker.exe 32 PID 620 wrote to memory of 1904 620 Trojan-Ransom.Win32.Blocker.exe 32 PID 1188 wrote to memory of 1504 1188 cmd.exe 34 PID 1188 wrote to memory of 1504 1188 cmd.exe 34 PID 1188 wrote to memory of 1504 1188 cmd.exe 34 PID 1188 wrote to memory of 1504 1188 cmd.exe 34 PID 676 wrote to memory of 1816 676 cmd.exe 37 PID 676 wrote to memory of 1816 676 cmd.exe 37 PID 676 wrote to memory of 1816 676 cmd.exe 37 PID 676 wrote to memory of 1816 676 cmd.exe 37 PID 1252 wrote to memory of 1072 1252 cmd.exe 36 PID 1252 wrote to memory of 1072 1252 cmd.exe 36 PID 1252 wrote to memory of 1072 1252 cmd.exe 36 PID 1252 wrote to memory of 1072 1252 cmd.exe 36 PID 1904 wrote to memory of 1820 1904 cmd.exe 38 PID 1904 wrote to memory of 1820 1904 cmd.exe 38 PID 1904 wrote to memory of 1820 1904 cmd.exe 38 PID 1904 wrote to memory of 1820 1904 cmd.exe 38 PID 620 wrote to memory of 832 620 Trojan-Ransom.Win32.Blocker.exe 40 PID 620 wrote to memory of 832 620 Trojan-Ransom.Win32.Blocker.exe 40 PID 620 wrote to memory of 832 620 Trojan-Ransom.Win32.Blocker.exe 40 PID 620 wrote to memory of 832 620 Trojan-Ransom.Win32.Blocker.exe 40 PID 620 wrote to memory of 396 620 Trojan-Ransom.Win32.Blocker.exe 42 PID 620 wrote to memory of 396 620 Trojan-Ransom.Win32.Blocker.exe 42 PID 620 wrote to memory of 396 620 Trojan-Ransom.Win32.Blocker.exe 42 PID 620 wrote to memory of 396 620 Trojan-Ransom.Win32.Blocker.exe 42 PID 832 wrote to memory of 1808 832 cmd.exe 44 PID 832 wrote to memory of 1808 832 cmd.exe 44 PID 832 wrote to memory of 1808 832 cmd.exe 44 PID 832 wrote to memory of 1808 832 cmd.exe 44 PID 396 wrote to memory of 1976 396 cmd.exe 45 PID 396 wrote to memory of 1976 396 cmd.exe 45 PID 396 wrote to memory of 1976 396 cmd.exe 45 PID 396 wrote to memory of 1976 396 cmd.exe 45 PID 620 wrote to memory of 1908 620 Trojan-Ransom.Win32.Blocker.exe 46 PID 620 wrote to memory of 1908 620 Trojan-Ransom.Win32.Blocker.exe 46 PID 620 wrote to memory of 1908 620 Trojan-Ransom.Win32.Blocker.exe 46 PID 620 wrote to memory of 1908 620 Trojan-Ransom.Win32.Blocker.exe 46 PID 620 wrote to memory of 1752 620 Trojan-Ransom.Win32.Blocker.exe 47 PID 620 wrote to memory of 1752 620 Trojan-Ransom.Win32.Blocker.exe 47 PID 620 wrote to memory of 1752 620 Trojan-Ransom.Win32.Blocker.exe 47 PID 620 wrote to memory of 1752 620 Trojan-Ransom.Win32.Blocker.exe 47 PID 1752 wrote to memory of 1720 1752 cmd.exe 51 PID 1752 wrote to memory of 1720 1752 cmd.exe 51 PID 1752 wrote to memory of 1720 1752 cmd.exe 51 PID 1752 wrote to memory of 1720 1752 cmd.exe 51 PID 1908 wrote to memory of 1188 1908 cmd.exe 50 PID 1908 wrote to memory of 1188 1908 cmd.exe 50 PID 1908 wrote to memory of 1188 1908 cmd.exe 50 PID 1908 wrote to memory of 1188 1908 cmd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /IM minerd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM minerd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /IM cgminer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM cgminer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /IM ubasoft.exe2⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM ubasoft.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /IM jhprotominer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM jhprotominer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ /f /v Load /t REG_SZ /d C:\Users\Admin\AppData\Roaming\Trojan-Ransom.Win32.Blocker.exe2⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ /f /v Load /t REG_SZ /d C:\Users\Admin\AppData\Roaming\Trojan-Ransom.Win32.Blocker.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd %appdata% & rite.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Roaming\rite.exerite.exe3⤵
- Executes dropped EXE
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd %appdata% & cd right & cgminer.exe -o stratum+tcp://us.ltcrabbit.com:3334 -u azams.zeds -p matamu -I 122⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\right\cgminer.execgminer.exe -o stratum+tcp://us.ltcrabbit.com:3334 -u azams.zeds -p matamu -I 123⤵
- Executes dropped EXE
PID:1188
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd %appdata% & cd right & minerd.exe -o stratum+tcp://us.ltcrabbit.com:3334 -u azams.zeds -p matamu -t 32⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\right\minerd.exeminerd.exe -o stratum+tcp://us.ltcrabbit.com:3334 -u azams.zeds -p matamu -t 33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
956KB
MD5b2e8e9f8d738a97a75ee5318068d2960
SHA1ba52cfe270abd7547ad63bec4ae5ab676e800290
SHA2560c5f208de21292cc66aba0f08fc6f0552183ba03aef5c274c5b5043b2ac78818
SHA5123fde39138af13004ceef1053abdbbd7209b26d8d053b636f7cadca3b3686638d14df32da8922ff45dd8a7c65b1d970475e38f34039b40c81eb056d4ecc26a089
-
Filesize
956KB
MD5b2e8e9f8d738a97a75ee5318068d2960
SHA1ba52cfe270abd7547ad63bec4ae5ab676e800290
SHA2560c5f208de21292cc66aba0f08fc6f0552183ba03aef5c274c5b5043b2ac78818
SHA5123fde39138af13004ceef1053abdbbd7209b26d8d053b636f7cadca3b3686638d14df32da8922ff45dd8a7c65b1d970475e38f34039b40c81eb056d4ecc26a089
-
Filesize
240KB
MD56f15c32334d2310abf30187d6294eaf5
SHA14cd819bece131457122a992200bc0e58ce6b8a40
SHA25699356e0620182b9490e2a74ee03f406e155577e7e368ace2922a10d743163ee7
SHA51234822ab7693203a6cce7846aac784f44c139d31b5d9d75306049c47ac25037e72ef4e1ce62f782bb59e5ce223878663676f42b42421ab2f2dc9150ab36694191
-
Filesize
183KB
MD5ea5c563db06d96b90141698afd27f2fc
SHA140a903c091336a8108685bf891d5558863346d5f
SHA256583b585078f37f5d399a228f1b8021ca0a9e904a55792281048bae9cfe0e95c1
SHA512a72430144b357be500158f682b2fb7a6038dfbf12a01f9cede5c85e55cf683aa43d681992d0c26a4ccc108c75af8067aaf105cbf22a1815e712aa4bc504e4667
-
Filesize
183KB
MD5ea5c563db06d96b90141698afd27f2fc
SHA140a903c091336a8108685bf891d5558863346d5f
SHA256583b585078f37f5d399a228f1b8021ca0a9e904a55792281048bae9cfe0e95c1
SHA512a72430144b357be500158f682b2fb7a6038dfbf12a01f9cede5c85e55cf683aa43d681992d0c26a4ccc108c75af8067aaf105cbf22a1815e712aa4bc504e4667
-
Filesize
117KB
MD572c1ff7f3c7474850b11fc962ee1620c
SHA1b94f73a1ce848d18b38274c96e863df0636f48a7
SHA2563b159da9dad9afd4bd28b5b1a53dc502a2487068055ed8c30136a76cd6924890
SHA5121ed4b3c34dd0033ec2aa05bdacaa45041d9cd5880fdb5530ca033308ab349c09d4811bb276bbdf51a3040b7a337f9a5d33796924550962a56058203799c5bd53
-
Filesize
98KB
MD5bcaf983ab27437913e76776f79b850c5
SHA18544045069e9f6e7a121825d3cfa95f77547bab3
SHA25657fd78bb3d90c04ee949c062faf6725d361de34ff2fe301bce27d0238e9190ae
SHA51249e7ecb3829d3e8c23fad59232a28c8f81eb72f7f265739cd37cad4505da089f4f8b77e100842161cf52462c05e9e8f1f3eab9fbafee1daa665e791e2fe24252
-
Filesize
714KB
MD52fb622e0d2abdd9d4da636605ebdf187
SHA1e7d7c09ee20cdeb5aaa06771917337c67be69c3f
SHA2565f8bdbd6f544bc79156e2d77cdc3b61756c8d0bed3697d5d508a9e496cae854e
SHA5124fa5c44633539be5aa56f96c4b09fe3dd04949f3f36d8fc95ac57fb73bb2a5328933d502935b50a6a2565c10c370d98b80858642e82ae8cb23eef223508f5685
-
Filesize
714KB
MD52fb622e0d2abdd9d4da636605ebdf187
SHA1e7d7c09ee20cdeb5aaa06771917337c67be69c3f
SHA2565f8bdbd6f544bc79156e2d77cdc3b61756c8d0bed3697d5d508a9e496cae854e
SHA5124fa5c44633539be5aa56f96c4b09fe3dd04949f3f36d8fc95ac57fb73bb2a5328933d502935b50a6a2565c10c370d98b80858642e82ae8cb23eef223508f5685
-
Filesize
956KB
MD5b2e8e9f8d738a97a75ee5318068d2960
SHA1ba52cfe270abd7547ad63bec4ae5ab676e800290
SHA2560c5f208de21292cc66aba0f08fc6f0552183ba03aef5c274c5b5043b2ac78818
SHA5123fde39138af13004ceef1053abdbbd7209b26d8d053b636f7cadca3b3686638d14df32da8922ff45dd8a7c65b1d970475e38f34039b40c81eb056d4ecc26a089
-
Filesize
956KB
MD5b2e8e9f8d738a97a75ee5318068d2960
SHA1ba52cfe270abd7547ad63bec4ae5ab676e800290
SHA2560c5f208de21292cc66aba0f08fc6f0552183ba03aef5c274c5b5043b2ac78818
SHA5123fde39138af13004ceef1053abdbbd7209b26d8d053b636f7cadca3b3686638d14df32da8922ff45dd8a7c65b1d970475e38f34039b40c81eb056d4ecc26a089
-
Filesize
240KB
MD56f15c32334d2310abf30187d6294eaf5
SHA14cd819bece131457122a992200bc0e58ce6b8a40
SHA25699356e0620182b9490e2a74ee03f406e155577e7e368ace2922a10d743163ee7
SHA51234822ab7693203a6cce7846aac784f44c139d31b5d9d75306049c47ac25037e72ef4e1ce62f782bb59e5ce223878663676f42b42421ab2f2dc9150ab36694191
-
Filesize
183KB
MD5ea5c563db06d96b90141698afd27f2fc
SHA140a903c091336a8108685bf891d5558863346d5f
SHA256583b585078f37f5d399a228f1b8021ca0a9e904a55792281048bae9cfe0e95c1
SHA512a72430144b357be500158f682b2fb7a6038dfbf12a01f9cede5c85e55cf683aa43d681992d0c26a4ccc108c75af8067aaf105cbf22a1815e712aa4bc504e4667
-
Filesize
183KB
MD5ea5c563db06d96b90141698afd27f2fc
SHA140a903c091336a8108685bf891d5558863346d5f
SHA256583b585078f37f5d399a228f1b8021ca0a9e904a55792281048bae9cfe0e95c1
SHA512a72430144b357be500158f682b2fb7a6038dfbf12a01f9cede5c85e55cf683aa43d681992d0c26a4ccc108c75af8067aaf105cbf22a1815e712aa4bc504e4667
-
Filesize
117KB
MD572c1ff7f3c7474850b11fc962ee1620c
SHA1b94f73a1ce848d18b38274c96e863df0636f48a7
SHA2563b159da9dad9afd4bd28b5b1a53dc502a2487068055ed8c30136a76cd6924890
SHA5121ed4b3c34dd0033ec2aa05bdacaa45041d9cd5880fdb5530ca033308ab349c09d4811bb276bbdf51a3040b7a337f9a5d33796924550962a56058203799c5bd53
-
Filesize
98KB
MD5bcaf983ab27437913e76776f79b850c5
SHA18544045069e9f6e7a121825d3cfa95f77547bab3
SHA25657fd78bb3d90c04ee949c062faf6725d361de34ff2fe301bce27d0238e9190ae
SHA51249e7ecb3829d3e8c23fad59232a28c8f81eb72f7f265739cd37cad4505da089f4f8b77e100842161cf52462c05e9e8f1f3eab9fbafee1daa665e791e2fe24252
-
Filesize
714KB
MD52fb622e0d2abdd9d4da636605ebdf187
SHA1e7d7c09ee20cdeb5aaa06771917337c67be69c3f
SHA2565f8bdbd6f544bc79156e2d77cdc3b61756c8d0bed3697d5d508a9e496cae854e
SHA5124fa5c44633539be5aa56f96c4b09fe3dd04949f3f36d8fc95ac57fb73bb2a5328933d502935b50a6a2565c10c370d98b80858642e82ae8cb23eef223508f5685