Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 05:28
Static task
static1
Behavioral task
behavioral1
Sample
5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe
Resource
win10v2004-20220901-en
General
-
Target
5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe
-
Size
866KB
-
MD5
24e8071ecf5c1674bb5d27237fb79a16
-
SHA1
acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50
-
SHA256
5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f
-
SHA512
d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8
-
SSDEEP
24576:bRF2i9uZvK+IdpAmdDiIP/3RUVoFtzHZ0:KioK+7UvP/RxR0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1124 03005109.exe -
Deletes itself 1 IoCs
pid Process 1292 cmd.exe -
Loads dropped DLL 5 IoCs
pid Process 1756 cmd.exe 1756 cmd.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\03005109 = "C:\\ProgramData\\03005109\\03005109.exe" 5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 03005109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\03005109 = "C:\\PROGRA~3\\03005109\\03005109.exe" 03005109.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1124 03005109.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe 1124 03005109.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1292 1940 5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe 27 PID 1940 wrote to memory of 1292 1940 5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe 27 PID 1940 wrote to memory of 1292 1940 5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe 27 PID 1940 wrote to memory of 1292 1940 5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe 27 PID 1292 wrote to memory of 1756 1292 cmd.exe 29 PID 1292 wrote to memory of 1756 1292 cmd.exe 29 PID 1292 wrote to memory of 1756 1292 cmd.exe 29 PID 1292 wrote to memory of 1756 1292 cmd.exe 29 PID 1756 wrote to memory of 1124 1756 cmd.exe 30 PID 1756 wrote to memory of 1124 1756 cmd.exe 30 PID 1756 wrote to memory of 1124 1756 cmd.exe 30 PID 1756 wrote to memory of 1124 1756 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe"C:\Users\Admin\AppData\Local\Temp\5fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\03005109\03005109.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\03005109\03005109.exe /i3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\PROGRA~3\03005109\03005109.exeC:\PROGRA~3\03005109\03005109.exe /i4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1124
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
866KB
MD524e8071ecf5c1674bb5d27237fb79a16
SHA1acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50
SHA2565fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f
SHA512d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8
-
Filesize
866KB
MD524e8071ecf5c1674bb5d27237fb79a16
SHA1acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50
SHA2565fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f
SHA512d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8
-
Filesize
230B
MD5cf0845bd542b356dee3f4f3743c0e276
SHA1c68741052ebb92e1082960ec132f87773d8414a2
SHA256bf4a143c76fc37f586403ee51d73c4483274308816f951cd044393dbe26da012
SHA512bd6b9a5e612dd9091ef2a41082bc1e2679def7dbba85428dc82b14f96cfc8b329307db464c8706557bb5ac3903961a09299a403152692df7d06a81b0f64bc2ac
-
Filesize
866KB
MD524e8071ecf5c1674bb5d27237fb79a16
SHA1acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50
SHA2565fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f
SHA512d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8
-
Filesize
866KB
MD524e8071ecf5c1674bb5d27237fb79a16
SHA1acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50
SHA2565fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f
SHA512d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8
-
Filesize
866KB
MD524e8071ecf5c1674bb5d27237fb79a16
SHA1acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50
SHA2565fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f
SHA512d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8
-
Filesize
866KB
MD524e8071ecf5c1674bb5d27237fb79a16
SHA1acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50
SHA2565fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f
SHA512d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8
-
Filesize
866KB
MD524e8071ecf5c1674bb5d27237fb79a16
SHA1acccab3d7e8e5fe98267f3b84c0b2cb38f8d5b50
SHA2565fac647b5a4bf484838e0e00f40db252d1da3a8c6e5c8c9843c219eb2c90ef6f
SHA512d8b91706b1f636b0336644501428963a1d9ee660bf6975523ed0de8bff6b918fb7b89b814c4efebdf20039cf27b65bcdd23a0bfbf63308a085b18b4902a621d8