Analysis
-
max time kernel
37s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:54
Behavioral task
behavioral1
Sample
075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe
Resource
win10v2004-20221111-en
General
-
Target
075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe
-
Size
234KB
-
MD5
9ee6d29b1b568feaa87123ed03f36db3
-
SHA1
678fc28a78ca1727dbb5974efd4c784ae1c3c6ab
-
SHA256
075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b
-
SHA512
2cb6a4963692946323bdfe6ba67852f444d3fdf27a98e7ddb2d642c3749acef8ae26bc77f2e6591f381e651ada9f3b27a06eee498507ad84bb9fa594a68fdeb5
-
SSDEEP
6144:VnBThdqtE1FE8ndWLQGnxrn1FwIClJkgFc32v:nbDNQZJcTbk/S
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
retydtfdt26.exe26.exepid process 1756 retydtfdt26.exe 1608 26.exe -
Processes:
resource yara_rule behavioral1/memory/604-55-0x0000000000400000-0x0000000000426000-memory.dmp upx \Users\Admin\AppData\Local\Temp\RarSFX0\retydtfdt26.exe upx C:\Users\Admin\AppData\Local\Temp\RarSFX0\retydtfdt26.exe upx \Users\Admin\AppData\Local\Temp\RarSFX0\retydtfdt26.exe upx C:\Users\Admin\AppData\Local\Temp\RarSFX0\retydtfdt26.exe upx \Users\Admin\AppData\Local\Temp\RarSFX0\retydtfdt26.exe upx \Users\Admin\AppData\Local\Temp\RarSFX0\retydtfdt26.exe upx behavioral1/memory/1756-75-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/604-83-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Loads dropped DLL 13 IoCs
Processes:
075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exeretydtfdt26.exe26.exeWerFault.exepid process 604 075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe 1756 retydtfdt26.exe 1756 retydtfdt26.exe 1756 retydtfdt26.exe 1756 retydtfdt26.exe 1756 retydtfdt26.exe 1608 26.exe 1608 26.exe 1608 26.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe 1104 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1104 1608 WerFault.exe 26.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exeretydtfdt26.exe26.exedescription pid process target process PID 604 wrote to memory of 1756 604 075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe retydtfdt26.exe PID 604 wrote to memory of 1756 604 075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe retydtfdt26.exe PID 604 wrote to memory of 1756 604 075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe retydtfdt26.exe PID 604 wrote to memory of 1756 604 075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe retydtfdt26.exe PID 604 wrote to memory of 1756 604 075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe retydtfdt26.exe PID 604 wrote to memory of 1756 604 075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe retydtfdt26.exe PID 604 wrote to memory of 1756 604 075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe retydtfdt26.exe PID 1756 wrote to memory of 1608 1756 retydtfdt26.exe 26.exe PID 1756 wrote to memory of 1608 1756 retydtfdt26.exe 26.exe PID 1756 wrote to memory of 1608 1756 retydtfdt26.exe 26.exe PID 1756 wrote to memory of 1608 1756 retydtfdt26.exe 26.exe PID 1756 wrote to memory of 1608 1756 retydtfdt26.exe 26.exe PID 1756 wrote to memory of 1608 1756 retydtfdt26.exe 26.exe PID 1756 wrote to memory of 1608 1756 retydtfdt26.exe 26.exe PID 1608 wrote to memory of 1104 1608 26.exe WerFault.exe PID 1608 wrote to memory of 1104 1608 26.exe WerFault.exe PID 1608 wrote to memory of 1104 1608 26.exe WerFault.exe PID 1608 wrote to memory of 1104 1608 26.exe WerFault.exe PID 1608 wrote to memory of 1104 1608 26.exe WerFault.exe PID 1608 wrote to memory of 1104 1608 26.exe WerFault.exe PID 1608 wrote to memory of 1104 1608 26.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe"C:\Users\Admin\AppData\Local\Temp\075eb2293e555722f119bc94d6a8883674a48150ee9df9c10ed863882c77544b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\retydtfdt26.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\retydtfdt26.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\26.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\26.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2564⤵
- Loads dropped DLL
- Program crash
PID:1104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
71KB
MD586abf19f9f136c4f80c6b76b45eb2d8c
SHA1ff8562326e4240a0c5e87c6f5759bb45134c0b2c
SHA2560b5e2a2354e60cea8f47029faf5b32fd171efe102fbf9d82bedff6427b39c55a
SHA512e913f031af3d51777169cd26c3d6403a2c6957f12b44a16accf653f0f2d2fe3eb0b629816bc22c3a27b33f7ab9cd7eda3dddf13d39a96b8dfbf911f71e85ae91
-
Filesize
71KB
MD586abf19f9f136c4f80c6b76b45eb2d8c
SHA1ff8562326e4240a0c5e87c6f5759bb45134c0b2c
SHA2560b5e2a2354e60cea8f47029faf5b32fd171efe102fbf9d82bedff6427b39c55a
SHA512e913f031af3d51777169cd26c3d6403a2c6957f12b44a16accf653f0f2d2fe3eb0b629816bc22c3a27b33f7ab9cd7eda3dddf13d39a96b8dfbf911f71e85ae91
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
115KB
MD52867fa0ccf392cf85ace1b318090f743
SHA198254a515c1e942eb3c7099d8a68c9bcf2eb8ab8
SHA256dfd6952ea037c6f994f4615468bb06b06628b533b4b22ee80d11b9929372d4b8
SHA512eb646809163994f52ab42ace1e9dd1fd1eb41ea5fad4ec8fe3f96b26836a9eab94f7331317f5e70995e9436433dd68726cab22f1865b91177628003f0b1072c5
-
Filesize
71KB
MD586abf19f9f136c4f80c6b76b45eb2d8c
SHA1ff8562326e4240a0c5e87c6f5759bb45134c0b2c
SHA2560b5e2a2354e60cea8f47029faf5b32fd171efe102fbf9d82bedff6427b39c55a
SHA512e913f031af3d51777169cd26c3d6403a2c6957f12b44a16accf653f0f2d2fe3eb0b629816bc22c3a27b33f7ab9cd7eda3dddf13d39a96b8dfbf911f71e85ae91
-
Filesize
71KB
MD586abf19f9f136c4f80c6b76b45eb2d8c
SHA1ff8562326e4240a0c5e87c6f5759bb45134c0b2c
SHA2560b5e2a2354e60cea8f47029faf5b32fd171efe102fbf9d82bedff6427b39c55a
SHA512e913f031af3d51777169cd26c3d6403a2c6957f12b44a16accf653f0f2d2fe3eb0b629816bc22c3a27b33f7ab9cd7eda3dddf13d39a96b8dfbf911f71e85ae91
-
Filesize
71KB
MD586abf19f9f136c4f80c6b76b45eb2d8c
SHA1ff8562326e4240a0c5e87c6f5759bb45134c0b2c
SHA2560b5e2a2354e60cea8f47029faf5b32fd171efe102fbf9d82bedff6427b39c55a
SHA512e913f031af3d51777169cd26c3d6403a2c6957f12b44a16accf653f0f2d2fe3eb0b629816bc22c3a27b33f7ab9cd7eda3dddf13d39a96b8dfbf911f71e85ae91
-
Filesize
71KB
MD586abf19f9f136c4f80c6b76b45eb2d8c
SHA1ff8562326e4240a0c5e87c6f5759bb45134c0b2c
SHA2560b5e2a2354e60cea8f47029faf5b32fd171efe102fbf9d82bedff6427b39c55a
SHA512e913f031af3d51777169cd26c3d6403a2c6957f12b44a16accf653f0f2d2fe3eb0b629816bc22c3a27b33f7ab9cd7eda3dddf13d39a96b8dfbf911f71e85ae91