Analysis
-
max time kernel
152s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:05
Static task
static1
Behavioral task
behavioral1
Sample
96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe
Resource
win10v2004-20221111-en
General
-
Target
96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe
-
Size
669KB
-
MD5
529afe0f51eff7bcf18d7d7f890aa530
-
SHA1
05d4c07e5bbf4a789fe2458b8a3326b3c2c46674
-
SHA256
96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4
-
SHA512
e8e49584d91a465612620f6b199ebd328c89fac6dae4c58fd0015b9200c5f2a0b0ed8d042bd55c22278db0289a6032d468b91fd2760ec964d7911c6f4e84f9a4
-
SSDEEP
12288:VHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:VDgINfAuBcgcZG2uG24MG4Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
ojfuuwj.exe~DFA7C.tmproxevuq.exepid process 2044 ojfuuwj.exe 336 ~DFA7C.tmp 888 roxevuq.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 560 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exeojfuuwj.exe~DFA7C.tmppid process 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe 2044 ojfuuwj.exe 336 ~DFA7C.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
roxevuq.exepid process 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe 888 roxevuq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
~DFA7C.tmpdescription pid process Token: SeDebugPrivilege 336 ~DFA7C.tmp -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exeojfuuwj.exe~DFA7C.tmpdescription pid process target process PID 1416 wrote to memory of 2044 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe ojfuuwj.exe PID 1416 wrote to memory of 2044 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe ojfuuwj.exe PID 1416 wrote to memory of 2044 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe ojfuuwj.exe PID 1416 wrote to memory of 2044 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe ojfuuwj.exe PID 1416 wrote to memory of 560 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe cmd.exe PID 1416 wrote to memory of 560 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe cmd.exe PID 1416 wrote to memory of 560 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe cmd.exe PID 1416 wrote to memory of 560 1416 96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe cmd.exe PID 2044 wrote to memory of 336 2044 ojfuuwj.exe ~DFA7C.tmp PID 2044 wrote to memory of 336 2044 ojfuuwj.exe ~DFA7C.tmp PID 2044 wrote to memory of 336 2044 ojfuuwj.exe ~DFA7C.tmp PID 2044 wrote to memory of 336 2044 ojfuuwj.exe ~DFA7C.tmp PID 336 wrote to memory of 888 336 ~DFA7C.tmp roxevuq.exe PID 336 wrote to memory of 888 336 ~DFA7C.tmp roxevuq.exe PID 336 wrote to memory of 888 336 ~DFA7C.tmp roxevuq.exe PID 336 wrote to memory of 888 336 ~DFA7C.tmp roxevuq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe"C:\Users\Admin\AppData\Local\Temp\96befb447a5a953dfcb07acc26d358d2b2511a650c2615408cc6b5c395e291f4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\ojfuuwj.exeC:\Users\Admin\AppData\Local\Temp\ojfuuwj.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\~DFA7C.tmpC:\Users\Admin\AppData\Local\Temp\~DFA7C.tmp OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\roxevuq.exe"C:\Users\Admin\AppData\Local\Temp\roxevuq.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- Deletes itself
PID:560
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uninsep.batFilesize
341B
MD5f90647b585a14bc8e53385e97a57256d
SHA14ccf8491dfc83b505b2dbf919a381e5137ee9adb
SHA256600e5c4928fee287d45c6f2918d4d85edb0353abbb6f65505c2aba74b9f54823
SHA5127af79912b6047f68bd469885dc39f67422a762080ec0b702a7b21b6b9560e35b8c744d75361eed08233f26ab9cf63a838c4fbe8cbc25567defe9eb4673af77ad
-
C:\Users\Admin\AppData\Local\Temp\gbp.iniFilesize
104B
MD586bb2dbeaef655893262f3c041f6afe2
SHA11b26ff1241c1353bd506c18bd0c11878076ba65d
SHA2564a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2
SHA51258294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
480B
MD539677a7bdf5933e1668b06d494f2d961
SHA190dc78c06aba8d1c42e8825eaa3cd1ecfd57863a
SHA256efdbfd27e24db94bd10773c16f14c9687f433da05badb99ea1e53f5991cb169d
SHA5122cc12cc28c372c0c764d7e8831dab2a51d134d7876cb7d57ee03ee87280d03fc11cd49a84f9d61977cdfed233974925524037057cba94d2f908b32df27c163cd
-
C:\Users\Admin\AppData\Local\Temp\ojfuuwj.exeFilesize
673KB
MD5ba700ae0674e2d8a781e6a766b06fd8d
SHA1861b863a540abd0b7b40013d21d52eb3eed29a8c
SHA256637c68c74a1e04495542ad39daf22bc432f75928cf68d423f9080607595e1f9e
SHA512bdf94a678d65f09790df74fdf531bacdc3f16e87316eb7cca9626d3e0ba2d0ae11f5b8ebb482a16902e082975e3f7d27c1c6880f9d5c5f2412d3cc5f920e20b8
-
C:\Users\Admin\AppData\Local\Temp\ojfuuwj.exeFilesize
673KB
MD5ba700ae0674e2d8a781e6a766b06fd8d
SHA1861b863a540abd0b7b40013d21d52eb3eed29a8c
SHA256637c68c74a1e04495542ad39daf22bc432f75928cf68d423f9080607595e1f9e
SHA512bdf94a678d65f09790df74fdf531bacdc3f16e87316eb7cca9626d3e0ba2d0ae11f5b8ebb482a16902e082975e3f7d27c1c6880f9d5c5f2412d3cc5f920e20b8
-
C:\Users\Admin\AppData\Local\Temp\roxevuq.exeFilesize
373KB
MD504998437bbc5013e8ab2b8586ccef781
SHA13ce40e38e424c24620a300cc0173d2bc3b621f01
SHA25688f613a4792d6ba97b0a3847a6f3faabe6735f69668ecccbd327c7bae2b87baf
SHA512ec83f48f463aaeca614515c3b7e167e9558bdde88f7f5e8825eeb8af89d1dd8a56ef9e66b14018edf2322a57a2a4fb447e5bda634ab2646110e8042649705f85
-
C:\Users\Admin\AppData\Local\Temp\~DFA7C.tmpFilesize
677KB
MD50bb0544ed6ca3ff172d9455476dddbfb
SHA1eb650829fcfe3306092daec2d4a10b657c3677c7
SHA256141a9e65a3f46c011e618e6847ebe14dcb6e2cdb17a50b0b4c8fd0aae1e3e877
SHA512975764073c3add1a966fe465e0eb753b30c2fe96c4e95e4dcb1c7e39e4158c170851fdfaf0aaff7b4a838f6f231e1cd6d803490b945524fd816cea40c72e36e7
-
\Users\Admin\AppData\Local\Temp\ojfuuwj.exeFilesize
673KB
MD5ba700ae0674e2d8a781e6a766b06fd8d
SHA1861b863a540abd0b7b40013d21d52eb3eed29a8c
SHA256637c68c74a1e04495542ad39daf22bc432f75928cf68d423f9080607595e1f9e
SHA512bdf94a678d65f09790df74fdf531bacdc3f16e87316eb7cca9626d3e0ba2d0ae11f5b8ebb482a16902e082975e3f7d27c1c6880f9d5c5f2412d3cc5f920e20b8
-
\Users\Admin\AppData\Local\Temp\roxevuq.exeFilesize
373KB
MD504998437bbc5013e8ab2b8586ccef781
SHA13ce40e38e424c24620a300cc0173d2bc3b621f01
SHA25688f613a4792d6ba97b0a3847a6f3faabe6735f69668ecccbd327c7bae2b87baf
SHA512ec83f48f463aaeca614515c3b7e167e9558bdde88f7f5e8825eeb8af89d1dd8a56ef9e66b14018edf2322a57a2a4fb447e5bda634ab2646110e8042649705f85
-
\Users\Admin\AppData\Local\Temp\~DFA7C.tmpFilesize
677KB
MD50bb0544ed6ca3ff172d9455476dddbfb
SHA1eb650829fcfe3306092daec2d4a10b657c3677c7
SHA256141a9e65a3f46c011e618e6847ebe14dcb6e2cdb17a50b0b4c8fd0aae1e3e877
SHA512975764073c3add1a966fe465e0eb753b30c2fe96c4e95e4dcb1c7e39e4158c170851fdfaf0aaff7b4a838f6f231e1cd6d803490b945524fd816cea40c72e36e7
-
memory/336-73-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/336-66-0x0000000000000000-mapping.dmp
-
memory/336-70-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/336-77-0x0000000003460000-0x000000000359E000-memory.dmpFilesize
1.2MB
-
memory/560-60-0x0000000000000000-mapping.dmp
-
memory/888-78-0x0000000000400000-0x000000000053E000-memory.dmpFilesize
1.2MB
-
memory/888-75-0x0000000000000000-mapping.dmp
-
memory/1416-54-0x0000000075E11000-0x0000000075E13000-memory.dmpFilesize
8KB
-
memory/1416-62-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1416-69-0x0000000001F20000-0x0000000001FFE000-memory.dmpFilesize
888KB
-
memory/1416-55-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2044-72-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/2044-57-0x0000000000000000-mapping.dmp
-
memory/2044-71-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB