Analysis
-
max time kernel
91s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe
Resource
win10v2004-20221111-en
General
-
Target
d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe
-
Size
51KB
-
MD5
25fdd695b0b15bbcd6c2bfc633fe85e4
-
SHA1
abc4d31b32053b5c3c4eedb98dcd79a315ba8099
-
SHA256
d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520
-
SHA512
ab5c1ef68983aaf5a8a159c2c51bc3900ada08e3be2c559a0d42f96212b30bf5358effb43ccea0ad25b0aae29d3d3164720d0dea687b63010314bb6a30840283
-
SSDEEP
768:Oe3PFaDVyOQgljLDKRJyM3BmsHzSB4us/wJJapg4RoSMZeUZB/DsLpL4JtP3:V3cpyORJLuB4P4AJJv4Romu/DELGl3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Internat Explorar\Desktop.ini d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 560 wrote to memory of 1800 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 28 PID 560 wrote to memory of 1800 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 28 PID 560 wrote to memory of 1800 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 28 PID 560 wrote to memory of 1800 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 28 PID 560 wrote to memory of 1800 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 28 PID 560 wrote to memory of 1800 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 28 PID 560 wrote to memory of 1800 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 28 PID 560 wrote to memory of 368 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 29 PID 560 wrote to memory of 368 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 29 PID 560 wrote to memory of 368 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 29 PID 560 wrote to memory of 368 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 29 PID 560 wrote to memory of 368 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 29 PID 560 wrote to memory of 368 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 29 PID 560 wrote to memory of 368 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 29 PID 368 wrote to memory of 1304 368 cmd.exe 32 PID 368 wrote to memory of 1304 368 cmd.exe 32 PID 368 wrote to memory of 1304 368 cmd.exe 32 PID 368 wrote to memory of 1304 368 cmd.exe 32 PID 368 wrote to memory of 1304 368 cmd.exe 32 PID 368 wrote to memory of 1304 368 cmd.exe 32 PID 368 wrote to memory of 1304 368 cmd.exe 32 PID 560 wrote to memory of 2016 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 34 PID 560 wrote to memory of 2016 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 34 PID 560 wrote to memory of 2016 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 34 PID 560 wrote to memory of 2016 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 34 PID 560 wrote to memory of 2016 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 34 PID 560 wrote to memory of 2016 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 34 PID 560 wrote to memory of 2016 560 d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe 34 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1304 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe"C:\Users\Admin\AppData\Local\Temp\d388e6f52021be66dab52da8dd993dcb0e2283770828279f528bcb043316b520.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move "C:\Users\Admin\AppData\Local\Temp\Internat Explorar" "C:\Users\Public\Desktop\Internat Explorar"2⤵PID:1800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib "C:\Users\Public\Desktop\Internat Explorar" +s2⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Public\Desktop\Internat Explorar" +s3⤵
- Views/modifies file attributes
PID:1304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\temp_tmp.bat" "2⤵
- Deletes itself
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250B
MD5d2775c8140ae7d965407a8219ec56083
SHA1ea5f0cad8be7b1e9c60475f229849e9ffb95873f
SHA2566c5ef3b3ab0b70de71618f16624a6f58f229a717f16b64e6ffb47c5c15b8fa3d
SHA512689bb0c8cef3e4ec4a51f8561de42e0c488849e8821b71ade04285ccc7ae57af5ed1fa2f64f0d878f6d28eff55d9879cf8242ec835ce18e29ed873d28db1c7ae
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667