Analysis
-
max time kernel
57s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe
Resource
win10v2004-20220812-en
General
-
Target
becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe
-
Size
241KB
-
MD5
07ecf6824b3fd015a5a781c6270aa880
-
SHA1
770e33c96e3302e6f3ce80368c888e34201178e2
-
SHA256
becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318
-
SHA512
ed99b10c3d067e1e2b5f908c13eb6c9bee41fbcbedecfddf1fd956ad5eeacadaea7cbd46b079f8c0b9cc13a899d6733fb6604cfc5d00e2e9ebf9e004760336ea
-
SSDEEP
6144:zZXBsWqsE/Ao+mv8Qv0LVmwq4FU0nN876NKxTEFTIUrH6qGY2Z:lXmwRo+mv8QD4+0N46NKxTEpfmqGYi
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 3 1740 WScript.exe 4 1740 WScript.exe -
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
Processes:
becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exedescription ioc process File created C:\Program Files (x86)\Insata\Ikars\Uninstall.ini becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\sanodo.vbs becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\albur.bat becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\1.txt becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\Uninstall.exe becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.execmd.exedescription pid process target process PID 1972 wrote to memory of 1588 1972 becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe cmd.exe PID 1972 wrote to memory of 1588 1972 becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe cmd.exe PID 1972 wrote to memory of 1588 1972 becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe cmd.exe PID 1972 wrote to memory of 1588 1972 becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe cmd.exe PID 1588 wrote to memory of 1740 1588 cmd.exe WScript.exe PID 1588 wrote to memory of 1740 1588 cmd.exe WScript.exe PID 1588 wrote to memory of 1740 1588 cmd.exe WScript.exe PID 1588 wrote to memory of 1740 1588 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe"C:\Users\Admin\AppData\Local\Temp\becaef7cf9d95b5331b0fe6e15a2248e5022b212c39b5722ee58598f84e33318.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Insata\Ikars\albur.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Insata\Ikars\sanodo.vbs"3⤵
- Blocklisted process makes network request
PID:1740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
888B
MD520164f42a89b5d842ebb4ce58b219322
SHA166ab51e1c4723a100695f4df9ea0c76da269af6a
SHA256374aa7f0f6213e3935313b8c37c1395ddf1d6e22a9bda8e85bcfbb8a5eaeb7e3
SHA512e38db8371eaf9455bae8efd2a7fcf7e11f5d7e94697e6e4e677a97a5d71c05efe455e0b283595410c569b3d51c11b04014b1027cc8c0e724c44e7d4c97a9ad44
-
Filesize
184B
MD507c7a107f46d0b6d9a93a64adf209131
SHA19835383223b8d2efe9799a07fea1b0c0bdb0f49a
SHA256c5f8690560819a396cde72774fff878c60c08de432b7f2feb367cdae409a5ff9
SHA512150eb7e48046c3579cacbf176c8f325d893d47ca3634662c489d6a0200de3b342a41095f1f71c8e0bc6e1f78da23ada01961d3661e06cc777c197d51133bfb69