Analysis
-
max time kernel
72s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:04
Static task
static1
Behavioral task
behavioral1
Sample
719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe
Resource
win10v2004-20220901-en
General
-
Target
719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe
-
Size
104KB
-
MD5
6e5f035ac8a5f1b79ccb48be4cd4fbcb
-
SHA1
293691c1c372f071d4706d9fe32d7b5d5e049a69
-
SHA256
719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038
-
SHA512
74acebae8f018905a32a64a11b5065cb44febbca7ec7be5155519340de38c4d467560d50c564a6c618d92b9a3c4785496980f5d1bd74e621fcab1c8d07b4fd87
-
SSDEEP
3072:VK0rfqc5lNsJjelRLONsoBbwAX9bRwAX9:VLrCkNsVQgsm5Xb5X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
LocalLHoLRKEpTP.exepid process 1160 LocalLHoLRKEpTP.exe -
Loads dropped DLL 1 IoCs
Processes:
dw20.exepid process 1976 dw20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exeLocalLHoLRKEpTP.exedescription pid process target process PID 2016 wrote to memory of 1160 2016 719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe LocalLHoLRKEpTP.exe PID 2016 wrote to memory of 1160 2016 719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe LocalLHoLRKEpTP.exe PID 2016 wrote to memory of 1160 2016 719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe LocalLHoLRKEpTP.exe PID 2016 wrote to memory of 1160 2016 719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe LocalLHoLRKEpTP.exe PID 1160 wrote to memory of 1976 1160 LocalLHoLRKEpTP.exe dw20.exe PID 1160 wrote to memory of 1976 1160 LocalLHoLRKEpTP.exe dw20.exe PID 1160 wrote to memory of 1976 1160 LocalLHoLRKEpTP.exe dw20.exe PID 1160 wrote to memory of 1976 1160 LocalLHoLRKEpTP.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe"C:\Users\Admin\AppData\Local\Temp\719f4f63b6a39719f535b0e9e84dc65d21c8a253eb07c1e4137c43c944497038.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\LocalLHoLRKEpTP.exe"C:\Users\Admin\AppData\LocalLHoLRKEpTP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9043⤵
- Loads dropped DLL
PID:1976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5fb0c6b18f3247f820fd8b0de1ad72f08
SHA1f74ea4851e532c615af4ead05cf1ec6851dccacc
SHA256f84abcc50851be58ab8701e74ac34b9af984d49510594e7c5b2712ec84e7d602
SHA5125340265cb07978e67df0742e75e40b4a7d92b4b7800b4db3c9285c8f18d1ca15b58983e5f264dcc8fff65e8d9ab6ba50c8c3260fe20fb5429e532d0d31b8d3e9
-
Filesize
20KB
MD5fb0c6b18f3247f820fd8b0de1ad72f08
SHA1f74ea4851e532c615af4ead05cf1ec6851dccacc
SHA256f84abcc50851be58ab8701e74ac34b9af984d49510594e7c5b2712ec84e7d602
SHA5125340265cb07978e67df0742e75e40b4a7d92b4b7800b4db3c9285c8f18d1ca15b58983e5f264dcc8fff65e8d9ab6ba50c8c3260fe20fb5429e532d0d31b8d3e9
-
Filesize
20KB
MD5fb0c6b18f3247f820fd8b0de1ad72f08
SHA1f74ea4851e532c615af4ead05cf1ec6851dccacc
SHA256f84abcc50851be58ab8701e74ac34b9af984d49510594e7c5b2712ec84e7d602
SHA5125340265cb07978e67df0742e75e40b4a7d92b4b7800b4db3c9285c8f18d1ca15b58983e5f264dcc8fff65e8d9ab6ba50c8c3260fe20fb5429e532d0d31b8d3e9