Analysis
-
max time kernel
40s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:24
Behavioral task
behavioral1
Sample
13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe
Resource
win10v2004-20221111-en
General
-
Target
13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe
-
Size
513KB
-
MD5
03f0226d74e87205630e1af4b9355b02
-
SHA1
ddd17bae4641686ab6ef9b249c75e3a8d72132bb
-
SHA256
13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7
-
SHA512
81985f1068e9c4a8265fdb3416899494a332424245ec465422d922f3416f1dced883240eb97f73c7a9bdd72fcaac94fdbddaaef0ecbca09cdd09b108642fd896
-
SSDEEP
12288:fi01DQwMnzEbjhTpLg8m+DBVWEUa4rMkclJ5edxfO/:DQwx7vmKDW1okMS0/
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2012-55-0x0000000000400000-0x00000000004DA000-memory.dmp upx behavioral1/memory/2012-57-0x0000000000400000-0x00000000004DA000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1528 cmd.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/memory/2012-55-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe behavioral1/memory/2012-57-0x0000000000400000-0x00000000004DA000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exedescription pid process target process PID 2012 wrote to memory of 1528 2012 13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe cmd.exe PID 2012 wrote to memory of 1528 2012 13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe cmd.exe PID 2012 wrote to memory of 1528 2012 13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe cmd.exe PID 2012 wrote to memory of 1528 2012 13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe"C:\Users\Admin\AppData\Local\Temp\13496b57654faf3a901e15ede1f949188ca2825c932a99ed2302ade352653eb7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\s.cmd2⤵
- Deletes itself
PID:1528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285B
MD59fa8ae9ef34ccc7bb0af1e54a2b43fca
SHA12803cfc9da1f15980f1023ec60ff0114dc1f9b78
SHA25655c97c92140bdbab84c21ac76d4e551cf586090deff884b382804372d4d8b03a
SHA512834e31bd44aa31315daf82ae58755412864bc932de1b359e411f250bfbb15539aa97862c7cb0242e2840eb29e93041f727321734aec50785de7a0f36657648e5