Analysis
-
max time kernel
168s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 12:55
Static task
static1
Behavioral task
behavioral1
Sample
de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe
Resource
win10v2004-20220812-en
General
-
Target
de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe
-
Size
82KB
-
MD5
ecf20a637b33a61f4eae6dadc2b0e1f9
-
SHA1
55519b8bb5ee5a27f932aa268193a34a292c9d70
-
SHA256
de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351
-
SHA512
446553c8706bf5f4708134bb374f9b77d38563b92a5e02b58fdcd17ca84ebbb58c906be484e7eeab8234f8903101577f17928b1a2e498baa44bb7aeba81d0d30
-
SSDEEP
1536:v81yXR5WQDW4ep7HKMbwM3kPARpY1Ihce/CODuvogVMlCuvogZMlaHgvaU0V:v81yX7iRpueaOVHgvaU0V
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
nyrtuc.exepid process 884 nyrtuc.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 604 cmd.exe -
Drops file in Windows directory 2 IoCs
Processes:
de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exedescription ioc process File created C:\Windows\nyrtuc.exe de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe File opened for modification C:\Windows\nyrtuc.exe de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exedescription pid process Token: SeIncBasePriorityPrivilege 1812 de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exedescription pid process target process PID 1812 wrote to memory of 604 1812 de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe cmd.exe PID 1812 wrote to memory of 604 1812 de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe cmd.exe PID 1812 wrote to memory of 604 1812 de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe cmd.exe PID 1812 wrote to memory of 604 1812 de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe"C:\Users\Admin\AppData\Local\Temp\de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\DE0E8A~1.EXE > nul2⤵
- Deletes itself
PID:604
-
C:\Windows\nyrtuc.exeC:\Windows\nyrtuc.exe1⤵
- Executes dropped EXE
PID:884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5ecf20a637b33a61f4eae6dadc2b0e1f9
SHA155519b8bb5ee5a27f932aa268193a34a292c9d70
SHA256de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351
SHA512446553c8706bf5f4708134bb374f9b77d38563b92a5e02b58fdcd17ca84ebbb58c906be484e7eeab8234f8903101577f17928b1a2e498baa44bb7aeba81d0d30
-
Filesize
82KB
MD5ecf20a637b33a61f4eae6dadc2b0e1f9
SHA155519b8bb5ee5a27f932aa268193a34a292c9d70
SHA256de0e8aaa23a718d0207558c60b36270e900775cf8a1ecfb7e89e3a3d6fd1d351
SHA512446553c8706bf5f4708134bb374f9b77d38563b92a5e02b58fdcd17ca84ebbb58c906be484e7eeab8234f8903101577f17928b1a2e498baa44bb7aeba81d0d30