Analysis
-
max time kernel
73s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:53
Static task
static1
Behavioral task
behavioral1
Sample
cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe
Resource
win10v2004-20220812-en
General
-
Target
cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe
-
Size
10.7MB
-
MD5
44b6738f0b2896dff834fe9b30aaf7a4
-
SHA1
85385bdfff7b624ce317c4133a58d13c8aea34e7
-
SHA256
cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb
-
SHA512
408a78ac7391c9911be91d3b1d7c4512be89103e9bfa7a206ac97a6dc714706a5cc049ca2b918ac36106fafe1899aa115b30fe7405df36a864ccf8bc412b7cab
-
SSDEEP
196608:bUdbjjbx8FWvc1ZMXd9M1BvLmPWh5BMLTeQDR45gb+dj02Hzn/pwNiN2x259s69:bUBHGFWvcfMXdW6Wh5eTdDYaxAn/pwUX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
software.exesoftware.tmppid process 1712 software.exe 1636 software.tmp -
Loads dropped DLL 9 IoCs
Processes:
cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exesoftware.exesoftware.tmppid process 952 cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe 1712 software.exe 1712 software.exe 1712 software.exe 1636 software.tmp 1636 software.tmp 1636 software.tmp 1636 software.tmp 1636 software.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exesoftware.exedescription pid process target process PID 952 wrote to memory of 1712 952 cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe software.exe PID 952 wrote to memory of 1712 952 cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe software.exe PID 952 wrote to memory of 1712 952 cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe software.exe PID 952 wrote to memory of 1712 952 cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe software.exe PID 952 wrote to memory of 1712 952 cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe software.exe PID 952 wrote to memory of 1712 952 cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe software.exe PID 952 wrote to memory of 1712 952 cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe software.exe PID 1712 wrote to memory of 1636 1712 software.exe software.tmp PID 1712 wrote to memory of 1636 1712 software.exe software.tmp PID 1712 wrote to memory of 1636 1712 software.exe software.tmp PID 1712 wrote to memory of 1636 1712 software.exe software.tmp PID 1712 wrote to memory of 1636 1712 software.exe software.tmp PID 1712 wrote to memory of 1636 1712 software.exe software.tmp PID 1712 wrote to memory of 1636 1712 software.exe software.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe"C:\Users\Admin\AppData\Local\Temp\cdbd385ec40b14aeeee6abcdb72fc628167f0bf4869631ee944faed770c679bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\software.exeC:\Users\Admin\AppData\Local\Temp\software.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\is-DJVI6.tmp\software.tmp"C:\Users\Admin\AppData\Local\Temp\is-DJVI6.tmp\software.tmp" /SL5="$70122,10932911,68608,C:\Users\Admin\AppData\Local\Temp\software.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684KB
MD5d8a7b498db39499a9205e6372bbd5301
SHA1f5fb4bb2142c20b7cdda00ffe16275990000dd55
SHA256218e4dba9a00fa76591cc7a17eb6434a202ca3527e80508f8d74cb355c31c2d7
SHA512ce0fe80791fbb98d2f51b56b6bc4477b99ea1c41940c511eee1495b48188eab4178ecfad272dbf1ce2560b63297e72a6667bc476a7b3a6ea288ccdc76fcfa84c
-
Filesize
684KB
MD5d8a7b498db39499a9205e6372bbd5301
SHA1f5fb4bb2142c20b7cdda00ffe16275990000dd55
SHA256218e4dba9a00fa76591cc7a17eb6434a202ca3527e80508f8d74cb355c31c2d7
SHA512ce0fe80791fbb98d2f51b56b6bc4477b99ea1c41940c511eee1495b48188eab4178ecfad272dbf1ce2560b63297e72a6667bc476a7b3a6ea288ccdc76fcfa84c
-
Filesize
10.7MB
MD5d90ac7b34abbbd60b761da9723ecb6b2
SHA15c8dafbb9752b8dd5b5e96034581ca9f306adce1
SHA25624619e640dc772a20fae53d2c610ff43205a4378ac3ec7b1ffdebe5178289ed1
SHA512debd4c179610dca3dc4f0715fada665761b7e27c631df8885041ae2a7ce00127f75a87d90e8f2c1d338cbf60429cfa6c2b725c21c7bc539c4a6124d1906093dd
-
Filesize
10.7MB
MD5d90ac7b34abbbd60b761da9723ecb6b2
SHA15c8dafbb9752b8dd5b5e96034581ca9f306adce1
SHA25624619e640dc772a20fae53d2c610ff43205a4378ac3ec7b1ffdebe5178289ed1
SHA512debd4c179610dca3dc4f0715fada665761b7e27c631df8885041ae2a7ce00127f75a87d90e8f2c1d338cbf60429cfa6c2b725c21c7bc539c4a6124d1906093dd
-
Filesize
684KB
MD5d8a7b498db39499a9205e6372bbd5301
SHA1f5fb4bb2142c20b7cdda00ffe16275990000dd55
SHA256218e4dba9a00fa76591cc7a17eb6434a202ca3527e80508f8d74cb355c31c2d7
SHA512ce0fe80791fbb98d2f51b56b6bc4477b99ea1c41940c511eee1495b48188eab4178ecfad272dbf1ce2560b63297e72a6667bc476a7b3a6ea288ccdc76fcfa84c
-
Filesize
97KB
MD5a96d045389a83b44bce302a255cf06c8
SHA1e495735d19903433546315c42ce5f2947e1eccee
SHA256ac1da22a5ab97f94d52b3cefac7910338786b5cd4f0fb6c823e4ac91f37baf25
SHA51228c280cfa5ebf756ebd7d3f9df23a8a05b8e1b15a2e3abc11c557329e37219e31aa18e507bce733e41e3e46b73dd186eed760d88495b6abe43fce9360bd82c1f
-
Filesize
227KB
MD511cb58def67ec8b238548c04c89db02d
SHA1c902f2389217a289343bdf0ba75d0fcacbb9de04
SHA256f1164cad5d93a07cf81436458741a00a79555aa679200dbae4f595dd4972dab9
SHA512756505066c6473b45166cd40f2e545cab4c65598b928ccde093a1f69e409acc0bc2b0094952afbc6430fc3dcd3028d44db9b96ac628a168bcb3ad168c7371712
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
52KB
MD5a9857c3b9c339fb16e1b0d26d1ba5332
SHA18fe84dc2ea9b59637a4348bd1e2dbb2a8027ca10
SHA256ea68738427039a7b58f58b7293733e222f9def6cf3828f30812d8f5aafc23768
SHA5121ddeff4100328ffdce0609947d51bf93e749fd278977e808a722b25ed0e25aab1a75d35aa936956f53dd74363f8ab4f0558b20a0ec4ca2a33e37993a1073d779
-
Filesize
10.7MB
MD5d90ac7b34abbbd60b761da9723ecb6b2
SHA15c8dafbb9752b8dd5b5e96034581ca9f306adce1
SHA25624619e640dc772a20fae53d2c610ff43205a4378ac3ec7b1ffdebe5178289ed1
SHA512debd4c179610dca3dc4f0715fada665761b7e27c631df8885041ae2a7ce00127f75a87d90e8f2c1d338cbf60429cfa6c2b725c21c7bc539c4a6124d1906093dd
-
Filesize
10.7MB
MD5d90ac7b34abbbd60b761da9723ecb6b2
SHA15c8dafbb9752b8dd5b5e96034581ca9f306adce1
SHA25624619e640dc772a20fae53d2c610ff43205a4378ac3ec7b1ffdebe5178289ed1
SHA512debd4c179610dca3dc4f0715fada665761b7e27c631df8885041ae2a7ce00127f75a87d90e8f2c1d338cbf60429cfa6c2b725c21c7bc539c4a6124d1906093dd
-
Filesize
10.7MB
MD5d90ac7b34abbbd60b761da9723ecb6b2
SHA15c8dafbb9752b8dd5b5e96034581ca9f306adce1
SHA25624619e640dc772a20fae53d2c610ff43205a4378ac3ec7b1ffdebe5178289ed1
SHA512debd4c179610dca3dc4f0715fada665761b7e27c631df8885041ae2a7ce00127f75a87d90e8f2c1d338cbf60429cfa6c2b725c21c7bc539c4a6124d1906093dd