Analysis
-
max time kernel
145s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
DigioSmartClientWinV1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
DigioSmartClientWinV1.exe
Resource
win10v2004-20221111-en
General
-
Target
DigioSmartClientWinV1.exe
-
Size
2.6MB
-
MD5
2c26a5fe35fb0d917f94abf706dc37ca
-
SHA1
3aacc94414991041c970ef8f09980e5966e9e18b
-
SHA256
76920592836662d1651d20afd9ac1afee41c96324e1cb7ddfde3698edc4dc628
-
SHA512
a6f39e56017beac8e7a1085e415e5e52d439d7a6ed6bdd59505e44bdcf39f253ceede3f4754bcf13c508d51247e04d8bcf2b6259c569bdeb98282c9d8c60a1b6
-
SSDEEP
49152:m75D5c14Z/7oFu9TNtROHcXUY2he3E/6BaMT8N2x9mV7dfR:K504Z/7x9XRO8F2c3GN2vYJ5
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
DigioSmartClientWinV1.tmpDigioSmartClient.exepid process 1412 DigioSmartClientWinV1.tmp 316 DigioSmartClient.exe -
Loads dropped DLL 2 IoCs
Processes:
DigioSmartClientWinV1.execmd.exepid process 1356 DigioSmartClientWinV1.exe 604 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
DigioSmartClientWinV1.tmpdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run DigioSmartClientWinV1.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DigioSmartClient = "\"C:\\Program Files (x86)\\DigioSmartClient\\DigioSmartClient.exe\"" DigioSmartClientWinV1.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
Processes:
DigioSmartClientWinV1.tmpdescription ioc process File created C:\Program Files (x86)\DigioSmartClient\is-4D9T5.tmp DigioSmartClientWinV1.tmp File created C:\Program Files (x86)\DigioSmartClient\is-OHKK1.tmp DigioSmartClientWinV1.tmp File created C:\Program Files (x86)\DigioSmartClient\is-HE2NH.tmp DigioSmartClientWinV1.tmp File created C:\Program Files (x86)\DigioSmartClient\is-GNBVB.tmp DigioSmartClientWinV1.tmp File opened for modification C:\Program Files (x86)\DigioSmartClient\unins000.dat DigioSmartClientWinV1.tmp File opened for modification C:\Program Files (x86)\DigioSmartClient\DigioSmartClient.exe DigioSmartClientWinV1.tmp File created C:\Program Files (x86)\DigioSmartClient\unins000.dat DigioSmartClientWinV1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
DigioSmartClientWinV1.tmppid process 1412 DigioSmartClientWinV1.tmp 1412 DigioSmartClientWinV1.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DigioSmartClientWinV1.tmppid process 1412 DigioSmartClientWinV1.tmp -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
DigioSmartClientWinV1.exeDigioSmartClientWinV1.tmpcmd.exeDigioSmartClient.exejavaw.exedescription pid process target process PID 1356 wrote to memory of 1412 1356 DigioSmartClientWinV1.exe DigioSmartClientWinV1.tmp PID 1356 wrote to memory of 1412 1356 DigioSmartClientWinV1.exe DigioSmartClientWinV1.tmp PID 1356 wrote to memory of 1412 1356 DigioSmartClientWinV1.exe DigioSmartClientWinV1.tmp PID 1356 wrote to memory of 1412 1356 DigioSmartClientWinV1.exe DigioSmartClientWinV1.tmp PID 1356 wrote to memory of 1412 1356 DigioSmartClientWinV1.exe DigioSmartClientWinV1.tmp PID 1356 wrote to memory of 1412 1356 DigioSmartClientWinV1.exe DigioSmartClientWinV1.tmp PID 1356 wrote to memory of 1412 1356 DigioSmartClientWinV1.exe DigioSmartClientWinV1.tmp PID 1412 wrote to memory of 604 1412 DigioSmartClientWinV1.tmp cmd.exe PID 1412 wrote to memory of 604 1412 DigioSmartClientWinV1.tmp cmd.exe PID 1412 wrote to memory of 604 1412 DigioSmartClientWinV1.tmp cmd.exe PID 1412 wrote to memory of 604 1412 DigioSmartClientWinV1.tmp cmd.exe PID 604 wrote to memory of 316 604 cmd.exe DigioSmartClient.exe PID 604 wrote to memory of 316 604 cmd.exe DigioSmartClient.exe PID 604 wrote to memory of 316 604 cmd.exe DigioSmartClient.exe PID 604 wrote to memory of 316 604 cmd.exe DigioSmartClient.exe PID 316 wrote to memory of 1076 316 DigioSmartClient.exe javaw.exe PID 316 wrote to memory of 1076 316 DigioSmartClient.exe javaw.exe PID 316 wrote to memory of 1076 316 DigioSmartClient.exe javaw.exe PID 316 wrote to memory of 1076 316 DigioSmartClient.exe javaw.exe PID 1076 wrote to memory of 1200 1076 javaw.exe cmd.exe PID 1076 wrote to memory of 1200 1076 javaw.exe cmd.exe PID 1076 wrote to memory of 1200 1076 javaw.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DigioSmartClientWinV1.exe"C:\Users\Admin\AppData\Local\Temp\DigioSmartClientWinV1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\is-V9P0I.tmp\DigioSmartClientWinV1.tmp"C:\Users\Admin\AppData\Local\Temp\is-V9P0I.tmp\DigioSmartClientWinV1.tmp" /SL5="$70124,2498203,62976,C:\Users\Admin\AppData\Local\Temp\DigioSmartClientWinV1.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Program Files (x86)\DigioSmartClient\DigioSmartClient.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Program Files (x86)\DigioSmartClient\DigioSmartClient.exe"C:\Program Files (x86)\DigioSmartClient\DigioSmartClient.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Program Files (x86)\DigioSmartClient\DigioSmartClient.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\cmd.execmd.exe /c "wmic OS get OSArchitecture"6⤵PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD568cd3c29f0a12a5ed1900130caf65a38
SHA13b871a5756c4817939047ae00a779bee948e6d90
SHA256d32469d0c846575fa17df0227326221a11bd2c8437504abe394ae2472c2b0d41
SHA512c1226a8dd95af3349e106fb223819adbc8153e9fb5ec77c49f68fd4a6d0b92589d3105a292a3f91572c1645a2146ef72f5a937ffeae228d21a5838b363ee80e4
-
Filesize
2.5MB
MD568cd3c29f0a12a5ed1900130caf65a38
SHA13b871a5756c4817939047ae00a779bee948e6d90
SHA256d32469d0c846575fa17df0227326221a11bd2c8437504abe394ae2472c2b0d41
SHA512c1226a8dd95af3349e106fb223819adbc8153e9fb5ec77c49f68fd4a6d0b92589d3105a292a3f91572c1645a2146ef72f5a937ffeae228d21a5838b363ee80e4
-
Filesize
702KB
MD53aa677774c26200eb78f1c5e23ee981c
SHA146688b35cc291c45b2eea674cc8cee4420652ecf
SHA2568106da5409b257dd305a2de755abc653a48e158f7a8d6348a9a5ad36c5708e37
SHA512b234f4dc2c85e47a9bc4616b1e53d20ce428c14e2487332d05c8cc4edc94486c79869a78c4761dc8c41ede8d9808b974c2da0a285f6a74a9ef581a460bfc7557
-
Filesize
702KB
MD53aa677774c26200eb78f1c5e23ee981c
SHA146688b35cc291c45b2eea674cc8cee4420652ecf
SHA2568106da5409b257dd305a2de755abc653a48e158f7a8d6348a9a5ad36c5708e37
SHA512b234f4dc2c85e47a9bc4616b1e53d20ce428c14e2487332d05c8cc4edc94486c79869a78c4761dc8c41ede8d9808b974c2da0a285f6a74a9ef581a460bfc7557
-
Filesize
2.5MB
MD568cd3c29f0a12a5ed1900130caf65a38
SHA13b871a5756c4817939047ae00a779bee948e6d90
SHA256d32469d0c846575fa17df0227326221a11bd2c8437504abe394ae2472c2b0d41
SHA512c1226a8dd95af3349e106fb223819adbc8153e9fb5ec77c49f68fd4a6d0b92589d3105a292a3f91572c1645a2146ef72f5a937ffeae228d21a5838b363ee80e4
-
Filesize
702KB
MD53aa677774c26200eb78f1c5e23ee981c
SHA146688b35cc291c45b2eea674cc8cee4420652ecf
SHA2568106da5409b257dd305a2de755abc653a48e158f7a8d6348a9a5ad36c5708e37
SHA512b234f4dc2c85e47a9bc4616b1e53d20ce428c14e2487332d05c8cc4edc94486c79869a78c4761dc8c41ede8d9808b974c2da0a285f6a74a9ef581a460bfc7557