Analysis
-
max time kernel
58s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe
Resource
win10v2004-20220812-en
General
-
Target
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe
-
Size
241KB
-
MD5
11fc02f5bc75f79b877d8fd3be6294f2
-
SHA1
48d32b39025f432790d992ec4fcec33886b8090c
-
SHA256
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad
-
SHA512
7b34266124aba62f8d24a5865cbe833af2659fcd0bd9492fa3690364483e3ccdcf651b6035485918d183402aebe2b5ac29ca9f656b716a03669bdf8a78a7c288
-
SSDEEP
6144:zZXBsWqsE/Ao+mv8Qv0LVmwq4FU0nN876NKxcubUmEcNYAlm:lXmwRo+mv8QD4+0N46NKxcYUm/YAg
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 3 464 WScript.exe 5 464 WScript.exe -
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
Processes:
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exedescription ioc process File opened for modification C:\Program Files (x86)\Insata\Ikars\sanodo.vbs c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\albur.bat c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\1.txt c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\Uninstall.exe c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe File created C:\Program Files (x86)\Insata\Ikars\Uninstall.ini c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.execmd.exedescription pid process target process PID 1296 wrote to memory of 1628 1296 c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe cmd.exe PID 1296 wrote to memory of 1628 1296 c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe cmd.exe PID 1296 wrote to memory of 1628 1296 c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe cmd.exe PID 1296 wrote to memory of 1628 1296 c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe cmd.exe PID 1628 wrote to memory of 464 1628 cmd.exe WScript.exe PID 1628 wrote to memory of 464 1628 cmd.exe WScript.exe PID 1628 wrote to memory of 464 1628 cmd.exe WScript.exe PID 1628 wrote to memory of 464 1628 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe"C:\Users\Admin\AppData\Local\Temp\c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Insata\Ikars\albur.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Insata\Ikars\sanodo.vbs"3⤵
- Blocklisted process makes network request
PID:464
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
979B
MD568a0bf1eb47cb02932d25426ccb54f36
SHA150d61ea2b5d5f1920e706a3a1526bef6af5620a2
SHA256543f707b708ddfe7bb5cea71c17b3998ead09503245eda431b0844655f1a785a
SHA512697052281d39c2361d0510d59fc8422e03a54cad98094b2e0e22fd4f0645bfa7bb2fce873033201ffa81278d773d63d40598ea154b3bb039ed2166dfc894e2ec
-
Filesize
175B
MD5c9414def752065a291fbd98e647b01b5
SHA1f47869aa51d098fd2cb73b290db2489a0d4656b5
SHA25636f3bf9879e9c3d39b6681af034b665fc551d27d1361dc4bf5801420ff71bce1
SHA51281c8f1db390d07a68c32a8a257c21cefe7f6882230244ad6ffe641a01c36636bceb8bfc758e43cbd56d445010a7e44b024835d4b92114ed22699ab626e27e65c