Analysis
-
max time kernel
58s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe
Resource
win10v2004-20220812-en
General
-
Target
b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe
-
Size
241KB
-
MD5
80b5a428de2b41909af9e3bb26dac8c3
-
SHA1
030d5cae3cc4a884883cd82d81744d50f1234255
-
SHA256
b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a
-
SHA512
a809c5a71443692418affd82d02859ed8b7660caa4889306c1fa0898fede113acdab3f3a8b97c57a63a409ad884a529e01d119ace565a8a4b0bf92b8abaf0273
-
SSDEEP
6144:zZXBsWqsE/Ao+mv8Qv0LVmwq4FU0nN876NKxMlyB5IEmF:lXmwRo+mv8QD4+0N46NKxn5pmF
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 3 1488 WScript.exe 5 1488 WScript.exe -
Drops file in Drivers directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 5 IoCs
Processes:
b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exedescription ioc process File opened for modification C:\Program Files (x86)\Insata\Ikars\sanodo.vbs b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\albur.bat b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\1.txt b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe File opened for modification C:\Program Files (x86)\Insata\Ikars\Uninstall.exe b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe File created C:\Program Files (x86)\Insata\Ikars\Uninstall.ini b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.execmd.exedescription pid process target process PID 1772 wrote to memory of 1776 1772 b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe cmd.exe PID 1772 wrote to memory of 1776 1772 b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe cmd.exe PID 1772 wrote to memory of 1776 1772 b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe cmd.exe PID 1772 wrote to memory of 1776 1772 b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe cmd.exe PID 1776 wrote to memory of 1488 1776 cmd.exe WScript.exe PID 1776 wrote to memory of 1488 1776 cmd.exe WScript.exe PID 1776 wrote to memory of 1488 1776 cmd.exe WScript.exe PID 1776 wrote to memory of 1488 1776 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe"C:\Users\Admin\AppData\Local\Temp\b34683c9294d6853c9deb929317e422548ebf47366ae0fac9612cd13e5bda09a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Insata\Ikars\albur.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Insata\Ikars\sanodo.vbs"3⤵
- Blocklisted process makes network request
PID:1488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
931B
MD5d40e09afec6aedf44464436336ff833d
SHA19c4b10dd7f4c3be534a36ac2912a1000e3d0c8ca
SHA256236ef2d63ab9fe62caaf4ed28d094f41c2aeb9960036d656aea2d60436d5a22d
SHA512ea7a2f1bdc2b0b286ae1941c2845bf1748c8d51839a52b6e8423939d2c05bdd65681d997938f8125de86d3684048e3aaa04f4f6f7e787973d5ec249fa15d430f
-
Filesize
163B
MD5e0b218b41158178a959bd50321e076dc
SHA1ff6de3f8030e1fa22f1dd0e5781c0dd6fd80da06
SHA256a36ca3b6e0ab051118027fca92c2b82e71ff9d8433e63a7584aa415fc3100a3e
SHA51271b6168470ed3b7602dbde80c3ba90549edee9d1e1d1dd47a787d6f467b6c967bd04d58b660313cb783571f89f32bd55acc25aefcc1f66e3c549cd00f3893866