Analysis
-
max time kernel
90s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:54
Static task
static1
Behavioral task
behavioral1
Sample
17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exe
Resource
win10v2004-20220901-en
General
-
Target
17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exe
-
Size
721KB
-
MD5
67f63ad6be699135e8c14e836874fca4
-
SHA1
2056d5b968e4cdfbbea684026540aa0a7b3ded71
-
SHA256
17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec
-
SHA512
ba8c26a41c7dc97cd6f810d697e48edc2f4727481e79c2f9b84098db6cbbc2cfb77625f10403cab25bd904612e690afc4eea7c3947721981e68faa4e912b89f6
-
SSDEEP
12288:CzZ7UjD5fFh/Rkn8qiZC8r6HzXStmy3Qpav3EVqxJaLFlBR5Wb7T4FDKA:CzZUFhHfZdr6TSme+avwRCYd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Au_.exepid process 3608 Au_.exe -
Loads dropped DLL 1 IoCs
Processes:
Au_.exepid process 3608 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exeAu_.exedescription pid process target process PID 3404 wrote to memory of 3608 3404 17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exe Au_.exe PID 3404 wrote to memory of 3608 3404 17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exe Au_.exe PID 3404 wrote to memory of 3608 3404 17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exe Au_.exe PID 3608 wrote to memory of 2184 3608 Au_.exe regsvr32.exe PID 3608 wrote to memory of 2184 3608 Au_.exe regsvr32.exe PID 3608 wrote to memory of 4304 3608 Au_.exe regsvr32.exe PID 3608 wrote to memory of 4304 3608 Au_.exe regsvr32.exe PID 3608 wrote to memory of 4304 3608 Au_.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exe"C:\Users\Admin\AppData\Local\Temp\17555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /u "C:\Windows\system32\CryptoKit.CertEnrollment.XTBank.x64.dll" /s3⤵PID:2184
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /u "C:\Windows\system32\CryptoKit.CertEnrollment.XTBank.x86.dll" /s3⤵PID:4304
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
721KB
MD567f63ad6be699135e8c14e836874fca4
SHA12056d5b968e4cdfbbea684026540aa0a7b3ded71
SHA25617555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec
SHA512ba8c26a41c7dc97cd6f810d697e48edc2f4727481e79c2f9b84098db6cbbc2cfb77625f10403cab25bd904612e690afc4eea7c3947721981e68faa4e912b89f6
-
Filesize
721KB
MD567f63ad6be699135e8c14e836874fca4
SHA12056d5b968e4cdfbbea684026540aa0a7b3ded71
SHA25617555d8164719bdb754a1e2da4a202bb64f9a9a4a10e3fcb8d2c1396e702d8ec
SHA512ba8c26a41c7dc97cd6f810d697e48edc2f4727481e79c2f9b84098db6cbbc2cfb77625f10403cab25bd904612e690afc4eea7c3947721981e68faa4e912b89f6