Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:49
Behavioral task
behavioral1
Sample
83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe
Resource
win10v2004-20220812-en
General
-
Target
83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe
-
Size
56KB
-
MD5
2c989d105bb6a48f0b129a544c72d3db
-
SHA1
2db15f13e32c5b056e4469ce6b161b455fd9f84b
-
SHA256
83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a
-
SHA512
3212841147d44bfb43dd0c53b07e257325846cdf6878ec69ed0ed7069d99f679fedb68e5fba07478567a2c2d1e49544519d8bf7bd805ce7a319f016021d92350
-
SSDEEP
768:i7VGsDZQVzeK9S/a+QcvrQlEoOcvlDYyRN83+6qHOrFG0zu9rS+jTho0wksML60p:4BZazGan0QnAyjC+6KO80urSIhoHM/
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1928 svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1760 NOTEPAD.EXE -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exepid process 1048 83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe 1048 83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exesvchost.exedescription pid process target process PID 1048 wrote to memory of 1928 1048 83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe svchost.exe PID 1048 wrote to memory of 1928 1048 83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe svchost.exe PID 1048 wrote to memory of 1928 1048 83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe svchost.exe PID 1048 wrote to memory of 1928 1048 83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe svchost.exe PID 1928 wrote to memory of 1760 1928 svchost.exe NOTEPAD.EXE PID 1928 wrote to memory of 1760 1928 svchost.exe NOTEPAD.EXE PID 1928 wrote to memory of 1760 1928 svchost.exe NOTEPAD.EXE PID 1928 wrote to memory of 1760 1928 svchost.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe"C:\Users\Admin\AppData\Local\Temp\83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.txt3⤵
- Opens file in notepad (likely ransom note)
PID:1760
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\83a5d394ef787e040282d86a6dc4692ebc347fca32f8f120ed2ea4641876da8a.txt
Filesize80B
MD5ce6235f3d42b3114fc9397894dd093ee
SHA1d852cc237fb77bf3494bce94f1e3780b68e8f902
SHA25696dc678f0b7166b888edc4683bb23f5419e3495efe3d70060613ea092e012c03
SHA512be0fe7fe10dc5446c0717af428535bb394481164edfc238fcfa4bed42a24dafecd6e65fc6a39d6bc890f9361f40d8ec2b3611a047a3b8cea236990ef778c3d03