Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:52
Static task
static1
Behavioral task
behavioral1
Sample
f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe
Resource
win10v2004-20221111-en
General
-
Target
f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe
-
Size
973KB
-
MD5
cb0b9766a27a5f2b7d43a7bb6b66904e
-
SHA1
6508d99df644c65f4da0b361a840ccd6464fb709
-
SHA256
f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa
-
SHA512
548bbbdd31349ba82b72cdce1aa54985087abd73f1642289fe81a34c9d8b1e64dfb6686fa39572d399810f6031b3f300937841510cd6fa5cf099b5f4911db0cc
-
SSDEEP
24576:72O/GlWswtHDyg7KCZXXVbhhUED4RVPVI8Q/ELb4I/nN:jtHegPZnVhhUEDAILWUI/nN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
acptwjvhik.exepid process 1312 acptwjvhik.exe -
Loads dropped DLL 9 IoCs
Processes:
f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exeWerFault.exepid process 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe 1360 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
acptwjvhik.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\C:\Users\Admin\2K1A7W~1 = "C:\\Users\\Admin\\2K1A7W~1\\mhksgnybjacogw.vbs" acptwjvhik.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce acptwjvhik.exe -
Processes:
acptwjvhik.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA acptwjvhik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1360 1312 WerFault.exe acptwjvhik.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
acptwjvhik.exepid process 1312 acptwjvhik.exe 1312 acptwjvhik.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exeacptwjvhik.exedescription pid process target process PID 1980 wrote to memory of 1312 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe acptwjvhik.exe PID 1980 wrote to memory of 1312 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe acptwjvhik.exe PID 1980 wrote to memory of 1312 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe acptwjvhik.exe PID 1980 wrote to memory of 1312 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe acptwjvhik.exe PID 1980 wrote to memory of 1312 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe acptwjvhik.exe PID 1980 wrote to memory of 1312 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe acptwjvhik.exe PID 1980 wrote to memory of 1312 1980 f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe acptwjvhik.exe PID 1312 wrote to memory of 1360 1312 acptwjvhik.exe WerFault.exe PID 1312 wrote to memory of 1360 1312 acptwjvhik.exe WerFault.exe PID 1312 wrote to memory of 1360 1312 acptwjvhik.exe WerFault.exe PID 1312 wrote to memory of 1360 1312 acptwjvhik.exe WerFault.exe PID 1312 wrote to memory of 1360 1312 acptwjvhik.exe WerFault.exe PID 1312 wrote to memory of 1360 1312 acptwjvhik.exe WerFault.exe PID 1312 wrote to memory of 1360 1312 acptwjvhik.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe"C:\Users\Admin\AppData\Local\Temp\f5e5a2215efbedafe5359e969e7abfe13fd9441f46870a3ec01efbc37494edfa.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\2k1a7wjyby5\acptwjvhik.exe"C:\Users\Admin\2k1a7wjyby5\acptwjvhik.exe" kzwfr.QVS2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 3043⤵
- Loads dropped DLL
- Program crash
PID:1360
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD511ee5d45a6ec3d33c2a915f391897ca9
SHA190d7014e85894d9d2a6d968a66d919f7fde123bc
SHA256c5e2a739a97062173c49a0b851a655453a710fc9910aab4164986b1b23b94327
SHA5123eb9177dab1d36b55bdb846b7fe53b490bb6b421c800374f53dc1e090e9a254451aa0bcc7a92226798cf81ba242f2eff868455578d04517828697f70706121e0
-
Filesize
172B
MD5e28675c1efabad9141861b162fab4a9a
SHA157bad78732d71903b89b51c8790d87b1b1301964
SHA2567ac5ed2f78f77efe9f438c85e75b7e9567420a4873cd1d090c273c2578f39408
SHA512982f94896fdf37f94c76f3b6aa32a3e69d6335a7200278da9aeff3b81b7fc10f8f2999a9cf504cad741016a80f95e319e80b8c873264943dd7d633a4c3e9898b
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
31.5MB
MD540a40cd740813e5f84d053c8f40ac524
SHA12c5028ef2a78360cfbdb90bdb39cbf29a0a446d6
SHA256e7db2d26d7bc04b5fddc033f952e8603e94e5092043697bc12a74c159c255771
SHA5129816bcf6dcba9a7ca3f56bdcb53eda5b41a44632067a041926fc0b05407cff1322d24b81ccf407e580370fa5fcc217d952ae7bf43dc0bce42f1748283408ac86
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd
-
Filesize
912KB
MD56a93a4071cc7c22628af40a4d872f49b
SHA1ba916e686aa0cae19ab907bdab94924ada92b5f4
SHA2568465f3fcbccce3ea12495edbb0bd09c3b066e3df891613ce3180f9bb38b37b01
SHA5125a26af395a03397aadab13a53cac320f1d8bbe77046a61ae12e1f72f93df7afb360f52ef52f979f7b946a814365a298c3a3a536add6cdd7165896fb82abc4afd