Analysis
-
max time kernel
154s -
max time network
208s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:40
Static task
static1
Behavioral task
behavioral1
Sample
8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe
Resource
win10v2004-20221111-en
General
-
Target
8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe
-
Size
20KB
-
MD5
8ed0aa8a61552b4cbd7c997894d5b3d8
-
SHA1
4f67814d6ac59acbae651de6ef7e8bbac855f4b1
-
SHA256
8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832
-
SHA512
929f3f395cc2e0aec9234a21ab48505bdef1dea312aa3bdc8765182a9a24ade08113d20bbd7ef7179c5c81342520edc612344b436fde9b11288ee50021628863
-
SSDEEP
384:CCdf0gjdiTpCrd+Ll2E204F1cQv8h4O7:tFdi4c8EAE4O7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
vvhhh.exepid process 1688 vvhhh.exe -
Deletes itself 1 IoCs
Processes:
vvhhh.exepid process 1688 vvhhh.exe -
Loads dropped DLL 1 IoCs
Processes:
8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exepid process 1184 8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of UnmapMainImage 2 IoCs
Processes:
8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exevvhhh.exepid process 1184 8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe 1688 vvhhh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exedescription pid process target process PID 1184 wrote to memory of 1688 1184 8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe vvhhh.exe PID 1184 wrote to memory of 1688 1184 8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe vvhhh.exe PID 1184 wrote to memory of 1688 1184 8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe vvhhh.exe PID 1184 wrote to memory of 1688 1184 8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe vvhhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe"C:\Users\Admin\AppData\Local\Temp\8f0aab0abbbe1519dadff8bc206568b144dfd36b605be090fe3098898e926832.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\vvhhh.exe"C:\Users\Admin\AppData\Local\Temp\vvhhh.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of UnmapMainImage
PID:1688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5114c75c7c637b2fef87762c02680fa6b
SHA15a9fcb2308985c865eb617681bdcbc614e2402fd
SHA256e1160aa4bc15b68431452a52b0d6d7e2ac52dc8a4911d4b7c9152478a51ec892
SHA512120fdda5b047e25368826bc31b492f3f75ed2f35e1f1823267599e6b512e146cb8c9b56080d2b2194afb21ea8a5c6035b0f9977102344e4a269cbda67511e6ae
-
Filesize
20KB
MD5114c75c7c637b2fef87762c02680fa6b
SHA15a9fcb2308985c865eb617681bdcbc614e2402fd
SHA256e1160aa4bc15b68431452a52b0d6d7e2ac52dc8a4911d4b7c9152478a51ec892
SHA512120fdda5b047e25368826bc31b492f3f75ed2f35e1f1823267599e6b512e146cb8c9b56080d2b2194afb21ea8a5c6035b0f9977102344e4a269cbda67511e6ae
-
Filesize
20KB
MD5114c75c7c637b2fef87762c02680fa6b
SHA15a9fcb2308985c865eb617681bdcbc614e2402fd
SHA256e1160aa4bc15b68431452a52b0d6d7e2ac52dc8a4911d4b7c9152478a51ec892
SHA512120fdda5b047e25368826bc31b492f3f75ed2f35e1f1823267599e6b512e146cb8c9b56080d2b2194afb21ea8a5c6035b0f9977102344e4a269cbda67511e6ae