Analysis
-
max time kernel
151s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:04
Static task
static1
Behavioral task
behavioral1
Sample
db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe
Resource
win10v2004-20220812-en
General
-
Target
db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe
-
Size
702KB
-
MD5
4345d9b5049c7cf2ea2d35564debeec0
-
SHA1
8e640ec8cd2274fdeab6b29285039ed4f283f9e7
-
SHA256
db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee
-
SHA512
7f50d4e53e672415db93200f9e203f31242baca7adb9680827e2550e0dbe5bb078a996f25f9ae8c1096861fced7039edca01c0f04b0e8c2023db35af9daa0fc8
-
SSDEEP
12288:VHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:VDgINfAuBcgcZG2uG24MG4Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
xuqyzad.exe~DFA69.tmpsyzoiod.exepid process 1348 xuqyzad.exe 1992 ~DFA69.tmp 1352 syzoiod.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1736 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exexuqyzad.exe~DFA69.tmppid process 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe 1348 xuqyzad.exe 1992 ~DFA69.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
syzoiod.exepid process 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe 1352 syzoiod.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
~DFA69.tmpdescription pid process Token: SeDebugPrivilege 1992 ~DFA69.tmp -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exexuqyzad.exe~DFA69.tmpdescription pid process target process PID 1852 wrote to memory of 1348 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe xuqyzad.exe PID 1852 wrote to memory of 1348 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe xuqyzad.exe PID 1852 wrote to memory of 1348 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe xuqyzad.exe PID 1852 wrote to memory of 1348 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe xuqyzad.exe PID 1348 wrote to memory of 1992 1348 xuqyzad.exe ~DFA69.tmp PID 1348 wrote to memory of 1992 1348 xuqyzad.exe ~DFA69.tmp PID 1348 wrote to memory of 1992 1348 xuqyzad.exe ~DFA69.tmp PID 1348 wrote to memory of 1992 1348 xuqyzad.exe ~DFA69.tmp PID 1852 wrote to memory of 1736 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe cmd.exe PID 1852 wrote to memory of 1736 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe cmd.exe PID 1852 wrote to memory of 1736 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe cmd.exe PID 1852 wrote to memory of 1736 1852 db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe cmd.exe PID 1992 wrote to memory of 1352 1992 ~DFA69.tmp syzoiod.exe PID 1992 wrote to memory of 1352 1992 ~DFA69.tmp syzoiod.exe PID 1992 wrote to memory of 1352 1992 ~DFA69.tmp syzoiod.exe PID 1992 wrote to memory of 1352 1992 ~DFA69.tmp syzoiod.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe"C:\Users\Admin\AppData\Local\Temp\db1f1cbd8825e5d8bc9a18826fbe128974ab8aadd4c24c7066e185f14456a0ee.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\xuqyzad.exeC:\Users\Admin\AppData\Local\Temp\xuqyzad.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\~DFA69.tmpC:\Users\Admin\AppData\Local\Temp\~DFA69.tmp OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\syzoiod.exe"C:\Users\Admin\AppData\Local\Temp\syzoiod.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uninsep.batFilesize
341B
MD579075e397721cc0b81d00653bd1a35f2
SHA1034ecd059bfa7b8a1240e142714b5609e3a85e8f
SHA2568c4e9ad8e99791134a3632856fa098a1b09f3ea35776ee17150e96529e96d6ed
SHA512a86ce90a5c51409e30d8c62f2ebd7ad0f5c1959a1b9a0e8328313e589b185e5540776d551c9d892c3a38dbc1b2ac361ce38c1fc1d255df677a9f664aa9feed62
-
C:\Users\Admin\AppData\Local\Temp\gbp.iniFilesize
104B
MD586bb2dbeaef655893262f3c041f6afe2
SHA11b26ff1241c1353bd506c18bd0c11878076ba65d
SHA2564a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2
SHA51258294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
480B
MD5316de58a9bf92fa6868c0c5b3a93d0f0
SHA15ad9054cc31222769995584bf2989a37736b7e27
SHA2562d55929e53fa136ffd550e5da36dc5d44bce29b0133c18f53245a8a1705c7746
SHA51253f4a48900630e8e2d98ea121369af446d186e997f1bbb0436b7982570885912b841053d28cc5a8e6edf0bc14c0a9fc65208d6efe04d5a9c042c120c84c8e61b
-
C:\Users\Admin\AppData\Local\Temp\syzoiod.exeFilesize
403KB
MD5e431412465dc06fbc9f31903b9b131a5
SHA1b91e16316628c990459ee4f7fb356383570041b9
SHA2563192868a36ccf091a72bf6784a921d6b6a6c39ae13c0a630788b13ad1ed3f5dd
SHA5129124b32d0c2544c171400a62b5d878a3767c8b5d402b689bafa4236c83ca94d803054a6198895caed8bb9a484d79fadef1b8fa756629065e777a4c09e1255a4e
-
C:\Users\Admin\AppData\Local\Temp\xuqyzad.exeFilesize
706KB
MD55df91ad9d860e9c9307a477cf77c8641
SHA1b3ba972184bd25eb021b437ec16109d0d8d90577
SHA2564650aa5269fd3e7024f49da4361670e376fa9f17f56806e98f28305fb9cf9b4a
SHA5120bf13d30a2c6b76220f18cfd2c18716b162ef91beef8382e9333186f9abe43fb2e0d61fd56ed93eff452d67776e49772698eef800c32590f9c75a041568a2863
-
C:\Users\Admin\AppData\Local\Temp\xuqyzad.exeFilesize
706KB
MD55df91ad9d860e9c9307a477cf77c8641
SHA1b3ba972184bd25eb021b437ec16109d0d8d90577
SHA2564650aa5269fd3e7024f49da4361670e376fa9f17f56806e98f28305fb9cf9b4a
SHA5120bf13d30a2c6b76220f18cfd2c18716b162ef91beef8382e9333186f9abe43fb2e0d61fd56ed93eff452d67776e49772698eef800c32590f9c75a041568a2863
-
C:\Users\Admin\AppData\Local\Temp\~DFA69.tmpFilesize
712KB
MD5927fc17bc21dc2c085d46f959d8c3c09
SHA105da4f05f8bb556ca1b296c74499f3a60e8a2dc0
SHA256ba11005a1e7182e0f47a01d31efddf4fed29ced3181053433c711725ab4979de
SHA512f72ac4b6bae114b089579cb3eb81586ee16c2cf69c202359634eef17a510dfdc54b18ca19fc86ae44b8a4dbab6b40969c959353b404521ecc5e5c3eb801f7584
-
\Users\Admin\AppData\Local\Temp\syzoiod.exeFilesize
403KB
MD5e431412465dc06fbc9f31903b9b131a5
SHA1b91e16316628c990459ee4f7fb356383570041b9
SHA2563192868a36ccf091a72bf6784a921d6b6a6c39ae13c0a630788b13ad1ed3f5dd
SHA5129124b32d0c2544c171400a62b5d878a3767c8b5d402b689bafa4236c83ca94d803054a6198895caed8bb9a484d79fadef1b8fa756629065e777a4c09e1255a4e
-
\Users\Admin\AppData\Local\Temp\xuqyzad.exeFilesize
706KB
MD55df91ad9d860e9c9307a477cf77c8641
SHA1b3ba972184bd25eb021b437ec16109d0d8d90577
SHA2564650aa5269fd3e7024f49da4361670e376fa9f17f56806e98f28305fb9cf9b4a
SHA5120bf13d30a2c6b76220f18cfd2c18716b162ef91beef8382e9333186f9abe43fb2e0d61fd56ed93eff452d67776e49772698eef800c32590f9c75a041568a2863
-
\Users\Admin\AppData\Local\Temp\~DFA69.tmpFilesize
712KB
MD5927fc17bc21dc2c085d46f959d8c3c09
SHA105da4f05f8bb556ca1b296c74499f3a60e8a2dc0
SHA256ba11005a1e7182e0f47a01d31efddf4fed29ced3181053433c711725ab4979de
SHA512f72ac4b6bae114b089579cb3eb81586ee16c2cf69c202359634eef17a510dfdc54b18ca19fc86ae44b8a4dbab6b40969c959353b404521ecc5e5c3eb801f7584
-
memory/1348-57-0x0000000000000000-mapping.dmp
-
memory/1348-62-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1348-72-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1352-75-0x0000000000000000-mapping.dmp
-
memory/1352-78-0x0000000000400000-0x000000000053E000-memory.dmpFilesize
1.2MB
-
memory/1736-68-0x0000000000000000-mapping.dmp
-
memory/1852-69-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1852-54-0x0000000076151000-0x0000000076153000-memory.dmpFilesize
8KB
-
memory/1852-61-0x0000000001E80000-0x0000000001F5E000-memory.dmpFilesize
888KB
-
memory/1852-55-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1992-70-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1992-73-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1992-65-0x0000000000000000-mapping.dmp
-
memory/1992-77-0x0000000003590000-0x00000000036CE000-memory.dmpFilesize
1.2MB