Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:39
Behavioral task
behavioral1
Sample
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe
Resource
win7-20220901-en
General
-
Target
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe
-
Size
48KB
-
MD5
8f1f6fe84252422b32490de26941667d
-
SHA1
aefdf7afc7f0127db015e9c5a5fba32764dcb65f
-
SHA256
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893
-
SHA512
82449e469044f4d82740dd803519444d064238f1d22af7c736333c8093268222e1831baf5314610a92fe95b727573be0f66a07abe142173c61511019e08092bd
-
SSDEEP
768:yqzAfdxZjz9oT1oOL0ysBj27/6nnnnnR5D70GlafPsA2XPa:BzAfdxZjz9oRoM0Jj27/6nnnnnR5DNGv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Tempserver.exepid process 1332 Tempserver.exe -
Loads dropped DLL 2 IoCs
Processes:
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exedw20.exepid process 1460 e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe 1736 dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exeTempserver.exedescription pid process target process PID 1460 wrote to memory of 1332 1460 e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe Tempserver.exe PID 1460 wrote to memory of 1332 1460 e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe Tempserver.exe PID 1460 wrote to memory of 1332 1460 e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe Tempserver.exe PID 1460 wrote to memory of 1332 1460 e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe Tempserver.exe PID 1332 wrote to memory of 1736 1332 Tempserver.exe dw20.exe PID 1332 wrote to memory of 1736 1332 Tempserver.exe dw20.exe PID 1332 wrote to memory of 1736 1332 Tempserver.exe dw20.exe PID 1332 wrote to memory of 1736 1332 Tempserver.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe"C:\Users\Admin\AppData\Local\Temp\e391b549cc575755655802d16691c97d32d21519259300193ae41b14d2053893.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Tempserver.exe"C:\Users\Admin\AppData\Local\Tempserver.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 3963⤵
- Loads dropped DLL
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD5c32da36c0e20bbad858843583913cee0
SHA1e21483236d5f4a8df0f9f94eeecbc79b0838204b
SHA256bf14c34ac9e91ee9423dd622228806d18f8e0e2a4843ecc97711aab7771b483b
SHA51218457cc75078ca0637b234a35fe9719cb72da307b68a1a587f5998d0e32ed5ff08676eaa72b28958c1d4159e9e4bd371962af14d1f3ea28b1fcc3e074bba4ced
-
Filesize
27KB
MD5c32da36c0e20bbad858843583913cee0
SHA1e21483236d5f4a8df0f9f94eeecbc79b0838204b
SHA256bf14c34ac9e91ee9423dd622228806d18f8e0e2a4843ecc97711aab7771b483b
SHA51218457cc75078ca0637b234a35fe9719cb72da307b68a1a587f5998d0e32ed5ff08676eaa72b28958c1d4159e9e4bd371962af14d1f3ea28b1fcc3e074bba4ced
-
Filesize
27KB
MD5c32da36c0e20bbad858843583913cee0
SHA1e21483236d5f4a8df0f9f94eeecbc79b0838204b
SHA256bf14c34ac9e91ee9423dd622228806d18f8e0e2a4843ecc97711aab7771b483b
SHA51218457cc75078ca0637b234a35fe9719cb72da307b68a1a587f5998d0e32ed5ff08676eaa72b28958c1d4159e9e4bd371962af14d1f3ea28b1fcc3e074bba4ced
-
Filesize
27KB
MD5c32da36c0e20bbad858843583913cee0
SHA1e21483236d5f4a8df0f9f94eeecbc79b0838204b
SHA256bf14c34ac9e91ee9423dd622228806d18f8e0e2a4843ecc97711aab7771b483b
SHA51218457cc75078ca0637b234a35fe9719cb72da307b68a1a587f5998d0e32ed5ff08676eaa72b28958c1d4159e9e4bd371962af14d1f3ea28b1fcc3e074bba4ced