Analysis
-
max time kernel
63s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe
Resource
win10v2004-20221111-en
General
-
Target
4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe
-
Size
241KB
-
MD5
af1f4f86dc4594add73e35f73011e2b8
-
SHA1
51cf43f667dba267a27f43b3eb4818564359bd0b
-
SHA256
4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055
-
SHA512
850c1aa4c4be581879c24ee67aba986de6c19f2a419ccec13c34a63277c9f3fb6021c04cf863aa558790fd65d4b317d2844e32d652b8c11c7e2bd426bf4a0d5d
-
SSDEEP
6144:zZXBsWqsE/Ao+mv8Qv0LVmwq4FU0nN876NKxCpQ0wxFT+g:lXmwRo+mv8QD4+0N46NKxCyHxl
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 3 940 WScript.exe 4 940 WScript.exe -
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
Processes:
4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exedescription ioc process File created C:\Program Files (x86)\Insata\Ikars\Uninstall.ini 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\sanodo.vbs 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\albur.bat 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\1.txt 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\Uninstall.exe 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.execmd.exedescription pid process target process PID 1424 wrote to memory of 1204 1424 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe cmd.exe PID 1424 wrote to memory of 1204 1424 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe cmd.exe PID 1424 wrote to memory of 1204 1424 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe cmd.exe PID 1424 wrote to memory of 1204 1424 4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe cmd.exe PID 1204 wrote to memory of 940 1204 cmd.exe WScript.exe PID 1204 wrote to memory of 940 1204 cmd.exe WScript.exe PID 1204 wrote to memory of 940 1204 cmd.exe WScript.exe PID 1204 wrote to memory of 940 1204 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe"C:\Users\Admin\AppData\Local\Temp\4d627dce7453de5aecbaf5362c65be354be38c410936f388093a46b56c764055.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Insata\Ikars\albur.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Insata\Ikars\sanodo.vbs"3⤵
- Blocklisted process makes network request
PID:940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
900B
MD5a628d3720e3c252fa5f2d34c16b68189
SHA1a70ee2d2497c0bdd4936bbadc725c0cf4d5d5597
SHA256d76717361021bf589669ce37c57c7126a4b1985347067b3fb6106d1844d9fc8c
SHA512976959f10415c16da7bfc39ec10ea8832ee6555310758666ed83ffbd41917ea81af1b3c7abb49fc718c6699611d57218feedf924b0e74243e4821fc050e1fefc
-
Filesize
189B
MD5e3a71ecbb9fc743aa29239c5b03a2fbe
SHA18aba26e09c8fd903f1dec0dd142115a431a0e0bd
SHA2568736e87a88ae6a1fa7dbc8722c39251af1ba49eb51329056bd1f68cf309df57d
SHA512e8301456e4582758d6375b25bea72750d2491082170510f0030ab5f9fc4b372b243d057f06451a0ae555f63e38172a859fd8565edd2db4acc33cd6f55f79af69