Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 14:55
Static task
static1
Behavioral task
behavioral1
Sample
0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe
Resource
win10v2004-20220901-en
General
-
Target
0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe
-
Size
512KB
-
MD5
0de4fa66b6ecea607fc63d9773749540
-
SHA1
b676b8e1a63ce54aace4f8e50c4cc2660abc0712
-
SHA256
0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8
-
SHA512
ff47fa65ee9e538fbfe7de1b9c7838340f7e04a6dcd96ba65c78ffc5a6563daa85ca2108379d29977fea2320ad560d8bd908814392eb562f52b80ead6fc6a36b
-
SSDEEP
12288:Ns4hG8f1PsYslobcRrgS880i50MRMc4UxYoUrO3LlS7uj5C:Ns4hjC9CClCMRoUKteLlVVC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1104 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 1660 0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe 1104 Au_.exe 1104 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral1/files/0x00090000000139f7-55.dat nsis_installer_1 behavioral1/files/0x00090000000139f7-55.dat nsis_installer_2 behavioral1/files/0x00090000000139f7-57.dat nsis_installer_1 behavioral1/files/0x00090000000139f7-57.dat nsis_installer_2 behavioral1/files/0x00090000000139f7-59.dat nsis_installer_1 behavioral1/files/0x00090000000139f7-59.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1104 1660 0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe 27 PID 1660 wrote to memory of 1104 1660 0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe 27 PID 1660 wrote to memory of 1104 1660 0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe 27 PID 1660 wrote to memory of 1104 1660 0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe"C:\Users\Admin\AppData\Local\Temp\0b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512KB
MD50de4fa66b6ecea607fc63d9773749540
SHA1b676b8e1a63ce54aace4f8e50c4cc2660abc0712
SHA2560b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8
SHA512ff47fa65ee9e538fbfe7de1b9c7838340f7e04a6dcd96ba65c78ffc5a6563daa85ca2108379d29977fea2320ad560d8bd908814392eb562f52b80ead6fc6a36b
-
Filesize
512KB
MD50de4fa66b6ecea607fc63d9773749540
SHA1b676b8e1a63ce54aace4f8e50c4cc2660abc0712
SHA2560b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8
SHA512ff47fa65ee9e538fbfe7de1b9c7838340f7e04a6dcd96ba65c78ffc5a6563daa85ca2108379d29977fea2320ad560d8bd908814392eb562f52b80ead6fc6a36b
-
Filesize
746KB
MD571be8be25eee408304e59d4b69d09ac2
SHA1c608bcc3ad762c5b32061f07266e95701ceb9325
SHA256fea5ad0d5ec9dc84e593eeb29f0c2bbeaf73b38e7c9ce32c2bbc021e59b1ff12
SHA512f8960478d32b006e96df7fbb0d3791b28f56554184987cafd55ab3d44d71ed9f01d5b6873048ad61803ecf3b2e52a92d9f1515f30734285328af09f25e87eb50
-
Filesize
746KB
MD571be8be25eee408304e59d4b69d09ac2
SHA1c608bcc3ad762c5b32061f07266e95701ceb9325
SHA256fea5ad0d5ec9dc84e593eeb29f0c2bbeaf73b38e7c9ce32c2bbc021e59b1ff12
SHA512f8960478d32b006e96df7fbb0d3791b28f56554184987cafd55ab3d44d71ed9f01d5b6873048ad61803ecf3b2e52a92d9f1515f30734285328af09f25e87eb50
-
Filesize
512KB
MD50de4fa66b6ecea607fc63d9773749540
SHA1b676b8e1a63ce54aace4f8e50c4cc2660abc0712
SHA2560b7e9ce3f842b4f730c9531f6bddddfd3859245fc6eb8758ec9478228fb189d8
SHA512ff47fa65ee9e538fbfe7de1b9c7838340f7e04a6dcd96ba65c78ffc5a6563daa85ca2108379d29977fea2320ad560d8bd908814392eb562f52b80ead6fc6a36b