Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:18
Static task
static1
Behavioral task
behavioral1
Sample
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe
Resource
win10v2004-20221111-en
General
-
Target
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe
-
Size
2.4MB
-
MD5
54a7c19c3978126a1120de7b6af5d48c
-
SHA1
bf8ca5950b9f0ccb64a15a192c718c5e0fab9f5b
-
SHA256
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4
-
SHA512
28c7ff438a3b02098bb6d85ea4eabd4ce0a678ca933c5f2b7d380ed88e634677f6dbca2c0a9ede366ece329b7809029e339bb50d4444d2ac1877898c3412e1f0
-
SSDEEP
49152:WxoIUFS2336KoEBCGCdJzjUxnC+EnvAhezw9o+ZZ7hGeJ3TuzcC4:PIUFSbK1C7/zYxCXhzw9o+DMmyzcL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
END 4 IDM.exeend.exepid process 1556 END 4 IDM.exe 336 end.exe -
Loads dropped DLL 6 IoCs
Processes:
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.execmd.exepid process 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe 1132 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exeEND 4 IDM.execmd.execmd.exedescription pid process target process PID 1944 wrote to memory of 1556 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe END 4 IDM.exe PID 1944 wrote to memory of 1556 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe END 4 IDM.exe PID 1944 wrote to memory of 1556 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe END 4 IDM.exe PID 1944 wrote to memory of 1556 1944 ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe END 4 IDM.exe PID 1556 wrote to memory of 1720 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1720 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1720 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1720 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1368 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1368 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1368 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1368 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1348 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1348 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1348 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1348 1556 END 4 IDM.exe cmd.exe PID 1348 wrote to memory of 1744 1348 cmd.exe attrib.exe PID 1348 wrote to memory of 1744 1348 cmd.exe attrib.exe PID 1348 wrote to memory of 1744 1348 cmd.exe attrib.exe PID 1348 wrote to memory of 1744 1348 cmd.exe attrib.exe PID 1556 wrote to memory of 944 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 944 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 944 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 944 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1692 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1692 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1692 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1692 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1132 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1132 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1132 1556 END 4 IDM.exe cmd.exe PID 1556 wrote to memory of 1132 1556 END 4 IDM.exe cmd.exe PID 1132 wrote to memory of 2032 1132 cmd.exe mode.com PID 1132 wrote to memory of 2032 1132 cmd.exe mode.com PID 1132 wrote to memory of 2032 1132 cmd.exe mode.com PID 1132 wrote to memory of 2032 1132 cmd.exe mode.com PID 1132 wrote to memory of 336 1132 cmd.exe end.exe PID 1132 wrote to memory of 336 1132 cmd.exe end.exe PID 1132 wrote to memory of 336 1132 cmd.exe end.exe PID 1132 wrote to memory of 336 1132 cmd.exe end.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe"C:\Users\Admin\AppData\Local\Temp\ff49b00b01057c6effc71e75ccefcded580ed896a41120a532422200a72be1b4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Temp\END 4 IDM.exe"C:\Temp\END 4 IDM.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\afolder" mkdir "C:\Users\Admin\AppData\Local\Temp\afolder"3⤵PID:1720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\ztmp" mkdir "C:\Users\Admin\AppData\Local\Temp\ztmp"3⤵PID:1368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\ztmp3⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\ztmp4⤵
- Views/modifies file attributes
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5099.bat" del "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5099.bat"3⤵PID:944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp7003.exe" del "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp7003.exe"3⤵PID:1692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5099.bat "C:\Temp\END 4 IDM.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\mode.commode 13,14⤵PID:2032
-
C:\Temp\end.exeend.exe4⤵
- Executes dropped EXE
PID:336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
849KB
MD5607598876e9dc8bcb7afb6ad25b88f10
SHA1530cd0b31445c7a436025842dfecd10c1fccd83e
SHA256dab4f5ba7f100ce986be92c6129534223ca700c1828509e2f456a533e56d400f
SHA5128116fa7d887e1193a621f67069624a772be5b60978fb2e3851767813f3a63ee99a2bba27fc0a0a321180d73f1554dce9ba14159ad420463a7dbb6cca0fd71191
-
Filesize
849KB
MD5607598876e9dc8bcb7afb6ad25b88f10
SHA1530cd0b31445c7a436025842dfecd10c1fccd83e
SHA256dab4f5ba7f100ce986be92c6129534223ca700c1828509e2f456a533e56d400f
SHA5128116fa7d887e1193a621f67069624a772be5b60978fb2e3851767813f3a63ee99a2bba27fc0a0a321180d73f1554dce9ba14159ad420463a7dbb6cca0fd71191
-
Filesize
464B
MD58b2d9c2fbd67ec760aafdc2c2a56e522
SHA1940f3ab0da916586e32e50d1c123eccab399e567
SHA256017ab84bd86d2a78da58f0a8de3a2cdad94d1d247ae6c831aae55fc5136d072e
SHA512e03b85fedb11567e9540c224bb79faedba278b931905e236cec91316724bc423d98706a37f8079de70ea60ec32cc788e86d2e5ca3f4dabfbc219343c526566b4
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
76KB
MD5944712b001e1a9eed533069a032e6509
SHA1854d21eb7c2637da1a26c2e92666c572cb62c903
SHA256f8454f89e87391e3076f0ca77edf41007bf3e6c2fc2810f37e016b3126ad589f
SHA512f57d31ba445c8cd234dca7db2492b3df360cb5678691f5968d457c9d735775eed74a893c5b09abf9558d8cbbf6acce715b6c60fa935264da68e27301c7d5ad81
-
Filesize
849KB
MD5607598876e9dc8bcb7afb6ad25b88f10
SHA1530cd0b31445c7a436025842dfecd10c1fccd83e
SHA256dab4f5ba7f100ce986be92c6129534223ca700c1828509e2f456a533e56d400f
SHA5128116fa7d887e1193a621f67069624a772be5b60978fb2e3851767813f3a63ee99a2bba27fc0a0a321180d73f1554dce9ba14159ad420463a7dbb6cca0fd71191