Analysis
-
max time kernel
156s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe
Resource
win10v2004-20220812-en
General
-
Target
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe
-
Size
241KB
-
MD5
11fc02f5bc75f79b877d8fd3be6294f2
-
SHA1
48d32b39025f432790d992ec4fcec33886b8090c
-
SHA256
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad
-
SHA512
7b34266124aba62f8d24a5865cbe833af2659fcd0bd9492fa3690364483e3ccdcf651b6035485918d183402aebe2b5ac29ca9f656b716a03669bdf8a78a7c288
-
SSDEEP
6144:zZXBsWqsE/Ao+mv8Qv0LVmwq4FU0nN876NKxcubUmEcNYAlm:lXmwRo+mv8QD4+0N46NKxcYUm/YAg
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 7 4996 WScript.exe -
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
Processes:
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exedescription ioc process File opened for modification C:\Program Files (x86)\Insata\Ikars\1.txt c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\Uninstall.exe c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe File created C:\Program Files (x86)\Insata\Ikars\Uninstall.ini c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\sanodo.vbs c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\albur.bat c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.execmd.exedescription pid process target process PID 4596 wrote to memory of 2240 4596 c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe cmd.exe PID 4596 wrote to memory of 2240 4596 c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe cmd.exe PID 4596 wrote to memory of 2240 4596 c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe cmd.exe PID 2240 wrote to memory of 4996 2240 cmd.exe WScript.exe PID 2240 wrote to memory of 4996 2240 cmd.exe WScript.exe PID 2240 wrote to memory of 4996 2240 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe"C:\Users\Admin\AppData\Local\Temp\c7f9cf1ede33275ac3c524c2c8f0295b9526c7b8e657a9028ca878c15a86b5ad.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Insata\Ikars\albur.bat" "2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Insata\Ikars\sanodo.vbs"3⤵
- Blocklisted process makes network request
PID:4996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
979B
MD568a0bf1eb47cb02932d25426ccb54f36
SHA150d61ea2b5d5f1920e706a3a1526bef6af5620a2
SHA256543f707b708ddfe7bb5cea71c17b3998ead09503245eda431b0844655f1a785a
SHA512697052281d39c2361d0510d59fc8422e03a54cad98094b2e0e22fd4f0645bfa7bb2fce873033201ffa81278d773d63d40598ea154b3bb039ed2166dfc894e2ec
-
Filesize
175B
MD5c9414def752065a291fbd98e647b01b5
SHA1f47869aa51d098fd2cb73b290db2489a0d4656b5
SHA25636f3bf9879e9c3d39b6681af034b665fc551d27d1361dc4bf5801420ff71bce1
SHA51281c8f1db390d07a68c32a8a257c21cefe7f6882230244ad6ffe641a01c36636bceb8bfc758e43cbd56d445010a7e44b024835d4b92114ed22699ab626e27e65c