Analysis
-
max time kernel
95s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 22:18
Static task
static1
Behavioral task
behavioral1
Sample
82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe
Resource
win10-20220812-en
General
-
Target
82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe
-
Size
5.2MB
-
MD5
65bc10aa24d76ec1b02a151a16d053c0
-
SHA1
81bfa89a47ef789ea1cc5c98f02df2bc2a038a4e
-
SHA256
82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150
-
SHA512
b0e22e0050090d6f8bc9ae8291005e406d3ab3ea60976aa9394f2c37f59645d8df0ddca7dfe927b0f604428092778da3a3a968da11bc73ea042dfc87d7b9d298
-
SSDEEP
98304:VXISESTXsUp7ZcjxlqSs/eAFe6WgdLzjnezZED:Vr5sjjxcz20pz6zZm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 848 quegego fatilila voy boji.exe -
Deletes itself 1 IoCs
pid Process 968 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1764 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1460 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 848 quegego fatilila voy boji.exe 848 quegego fatilila voy boji.exe 848 quegego fatilila voy boji.exe 848 quegego fatilila voy boji.exe 848 quegego fatilila voy boji.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1480 wrote to memory of 1764 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 29 PID 1480 wrote to memory of 1764 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 29 PID 1480 wrote to memory of 1764 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 29 PID 1480 wrote to memory of 1764 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 29 PID 1480 wrote to memory of 848 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 31 PID 1480 wrote to memory of 848 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 31 PID 1480 wrote to memory of 848 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 31 PID 1480 wrote to memory of 848 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 31 PID 1480 wrote to memory of 968 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 32 PID 1480 wrote to memory of 968 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 32 PID 1480 wrote to memory of 968 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 32 PID 1480 wrote to memory of 968 1480 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 32 PID 968 wrote to memory of 1660 968 cmd.exe 34 PID 968 wrote to memory of 1660 968 cmd.exe 34 PID 968 wrote to memory of 1660 968 cmd.exe 34 PID 968 wrote to memory of 1660 968 cmd.exe 34 PID 968 wrote to memory of 1460 968 cmd.exe 35 PID 968 wrote to memory of 1460 968 cmd.exe 35 PID 968 wrote to memory of 1460 968 cmd.exe 35 PID 968 wrote to memory of 1460 968 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe"C:\Users\Admin\AppData\Local\Temp\82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe"2⤵
- Creates scheduled task(s)
PID:1764
-
-
C:\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe"C:\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1660
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1460
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe
Filesize799.2MB
MD5402fc19ea41764eae825bb44611370c2
SHA12a5e0557e5b2251cee061b00564e63319dece793
SHA2567d914f1b84166e32dc13927248efbb2b8808818983e1d437b8a67a441717a570
SHA5126f6d04a9a2764bedb45e2e28c3a27d262bba5a6dd9f13e6a21d0856d0fac16f20fd9a96f328c8f2c691547b69bc0e7ba74610b5644ab9a4883f4045b93a3d924
-
\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe
Filesize799.2MB
MD5402fc19ea41764eae825bb44611370c2
SHA12a5e0557e5b2251cee061b00564e63319dece793
SHA2567d914f1b84166e32dc13927248efbb2b8808818983e1d437b8a67a441717a570
SHA5126f6d04a9a2764bedb45e2e28c3a27d262bba5a6dd9f13e6a21d0856d0fac16f20fd9a96f328c8f2c691547b69bc0e7ba74610b5644ab9a4883f4045b93a3d924
-
\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe
Filesize799.2MB
MD5402fc19ea41764eae825bb44611370c2
SHA12a5e0557e5b2251cee061b00564e63319dece793
SHA2567d914f1b84166e32dc13927248efbb2b8808818983e1d437b8a67a441717a570
SHA5126f6d04a9a2764bedb45e2e28c3a27d262bba5a6dd9f13e6a21d0856d0fac16f20fd9a96f328c8f2c691547b69bc0e7ba74610b5644ab9a4883f4045b93a3d924