Analysis
-
max time kernel
188s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502.exe
Resource
win10v2004-20220812-en
General
-
Target
dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502.exe
-
Size
97KB
-
MD5
0e8eba4e5c892aa4a09d707e35daef06
-
SHA1
a7b7ea36f903b7f5404c04447a53c1549442f48a
-
SHA256
dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502
-
SHA512
3cb3d4f98bd83372f628bd19f14ece0ebefa669c5fc3d634e70459f50f672af503764ffa0fdf12e025252437a777117ab74b91aafaf14c56cba0a816d6c823f9
-
SSDEEP
1536:6pgpHzb9dZVX9fHMvG0D3XJcMVqHPAfWQnrhQwRANI7LmK+utKcmjxFSs2p2T3r0:4gXdZt9P6D3XJcMVqvQBJjfm/S16rn0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4628 rmfsiknr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 4628 1180 dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502.exe 78 PID 1180 wrote to memory of 4628 1180 dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502.exe 78 PID 1180 wrote to memory of 4628 1180 dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502.exe"C:\Users\Admin\AppData\Local\Temp\dcfdd9fbaead8a88da69c3c236acd023d2da6d3917b291e4890a0d525220e502.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\nsf754.tmp\rmfsiknr.exeC:\Users\Admin\AppData\Local\Temp\nsf754.tmp\rmfsiknr.exe2⤵
- Executes dropped EXE
PID:4628
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD59775363761b511f205a8af193487289b
SHA149414612e36ecdcc513f1e4a5c5fb86ef4bdfce2
SHA256bdbf687a80526d228c986fa8bed936c31b58555f957fb01a87c1a8fedc821842
SHA512cd864e2d64a045e0755ebaecb508c0d45185d8baa3a9cf569c96cfd07cab400e1b42e5e25f0a542b64a22e219b202b8620c38bf55fc589e3b59a8f4d7b769e5e
-
Filesize
23KB
MD59775363761b511f205a8af193487289b
SHA149414612e36ecdcc513f1e4a5c5fb86ef4bdfce2
SHA256bdbf687a80526d228c986fa8bed936c31b58555f957fb01a87c1a8fedc821842
SHA512cd864e2d64a045e0755ebaecb508c0d45185d8baa3a9cf569c96cfd07cab400e1b42e5e25f0a542b64a22e219b202b8620c38bf55fc589e3b59a8f4d7b769e5e