Analysis
-
max time kernel
164s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:05
Static task
static1
Behavioral task
behavioral1
Sample
75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe
Resource
win10v2004-20220812-en
General
-
Target
75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe
-
Size
654KB
-
MD5
46627d964f330fc382a8266ed7720380
-
SHA1
0e298f50a7106f8b2152aecb316ead61033bed39
-
SHA256
75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab
-
SHA512
778e6cff3dde31cfd50e39fb11b1020b259b25f5fb371531d98026f09953490be7f001e3334a77666499fa3027d4b486f892d470a58bfe3bc75b403755bedda2
-
SSDEEP
12288:OHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:ODgINfAuBcgcZG2uG24MG4Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
kusajy.exe~DFA9F.tmphopoty.exepid process 1404 kusajy.exe 576 ~DFA9F.tmp 1320 hopoty.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1332 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exekusajy.exe~DFA9F.tmppid process 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe 1404 kusajy.exe 576 ~DFA9F.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
hopoty.exepid process 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe 1320 hopoty.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
~DFA9F.tmpdescription pid process Token: SeDebugPrivilege 576 ~DFA9F.tmp -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exekusajy.exe~DFA9F.tmpdescription pid process target process PID 1816 wrote to memory of 1404 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe kusajy.exe PID 1816 wrote to memory of 1404 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe kusajy.exe PID 1816 wrote to memory of 1404 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe kusajy.exe PID 1816 wrote to memory of 1404 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe kusajy.exe PID 1404 wrote to memory of 576 1404 kusajy.exe ~DFA9F.tmp PID 1404 wrote to memory of 576 1404 kusajy.exe ~DFA9F.tmp PID 1404 wrote to memory of 576 1404 kusajy.exe ~DFA9F.tmp PID 1404 wrote to memory of 576 1404 kusajy.exe ~DFA9F.tmp PID 1816 wrote to memory of 1332 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe cmd.exe PID 1816 wrote to memory of 1332 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe cmd.exe PID 1816 wrote to memory of 1332 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe cmd.exe PID 1816 wrote to memory of 1332 1816 75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe cmd.exe PID 576 wrote to memory of 1320 576 ~DFA9F.tmp hopoty.exe PID 576 wrote to memory of 1320 576 ~DFA9F.tmp hopoty.exe PID 576 wrote to memory of 1320 576 ~DFA9F.tmp hopoty.exe PID 576 wrote to memory of 1320 576 ~DFA9F.tmp hopoty.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe"C:\Users\Admin\AppData\Local\Temp\75aecf9c8ea62f5ffaa52d74f6d20e9249418823fc3b9707517d3e325ad23eab.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\kusajy.exeC:\Users\Admin\AppData\Local\Temp\kusajy.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\~DFA9F.tmpC:\Users\Admin\AppData\Local\Temp\~DFA9F.tmp OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\hopoty.exe"C:\Users\Admin\AppData\Local\Temp\hopoty.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- Deletes itself
PID:1332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_uninsep.batFilesize
341B
MD55a227f15087a52036f5d875768c82061
SHA1098df470f169161c931055c75009240859647794
SHA2563a7761ed65350b6b4afa65e414f8d030468ad96192bd58109063d3ef8328848a
SHA5125be9272c7cc97e185fb8f51f3db002f008c81531a0564907f3955bcd87da90f9cc3bb7602101c11435ee3aaa70c23f117881bf804cae78ae80616b74c8bccbc6
-
C:\Users\Admin\AppData\Local\Temp\gbp.iniFilesize
104B
MD586bb2dbeaef655893262f3c041f6afe2
SHA11b26ff1241c1353bd506c18bd0c11878076ba65d
SHA2564a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2
SHA51258294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
480B
MD561eee8db3adc5cb8fb5ca43f7a1bf29e
SHA17a1b5f49949a629f934982428af9bdaecc66f823
SHA25628eae0c79c2e1ba64c2b5e2e824a89bc4bb470a6d27d798ec9a4c4f9bb119648
SHA51293d46373e4b9f461e22b0ceba7587789fdbacdad19637e1e9958784685ec657593bde5cf9173bc47eddbada69b79206b8ce4bdcfb0b9bfcddb37b24ccbe5738e
-
C:\Users\Admin\AppData\Local\Temp\hopoty.exeFilesize
382KB
MD5d806340f65a236d499d288395e1066e8
SHA16adb524559d300a0885cd06cdebb52e473bbe9cb
SHA2567a82cb5de7f06d6157cd727d7e5a9c3abfa9fca68ff0f758ce3ce87f3fc391b2
SHA512b0c7063e6ec7dc26243720283f4a2ccaca6995e6d146c9008cd87bb92414907a3768853f9a3c1658863ef54ab7cd7fcb82ac79b3b8a02afbc505dd1c9517c4f5
-
C:\Users\Admin\AppData\Local\Temp\kusajy.exeFilesize
663KB
MD50fe13542d30a738128c7a6f141a44575
SHA14b39e3c86ca7716e525339ab5fec7aa31f95bc04
SHA256ae13facb167f3c05fffcea4a95ffc1577891f894abe9a992c82f0e2723597ff6
SHA51271236388f16af5ed8cfe2d054fd960324da3789175f40186b753447b54abcf59f45716c779d86d614289fe0a8a06954d7391e8918121dbc500fae695be7b0cb0
-
C:\Users\Admin\AppData\Local\Temp\kusajy.exeFilesize
663KB
MD50fe13542d30a738128c7a6f141a44575
SHA14b39e3c86ca7716e525339ab5fec7aa31f95bc04
SHA256ae13facb167f3c05fffcea4a95ffc1577891f894abe9a992c82f0e2723597ff6
SHA51271236388f16af5ed8cfe2d054fd960324da3789175f40186b753447b54abcf59f45716c779d86d614289fe0a8a06954d7391e8918121dbc500fae695be7b0cb0
-
C:\Users\Admin\AppData\Local\Temp\~DFA9F.tmpFilesize
673KB
MD5cdf79fc7723f3b67225e4f811a10d7bf
SHA1707e2673cd8c90118892f28999d78a5be628351c
SHA2562e7dcd7a82f444a6bcdd01c5f70ec29a961ee30619dbb133a738da6e75ad31c6
SHA51295e86af4868c0988333f43cc210ded8591fa8abd624f11f62640536d6aef23ef815083da514fa76a1f6b3bdb13cad86f9506034a066cd4191ef8b098cabbe7f0
-
\Users\Admin\AppData\Local\Temp\hopoty.exeFilesize
382KB
MD5d806340f65a236d499d288395e1066e8
SHA16adb524559d300a0885cd06cdebb52e473bbe9cb
SHA2567a82cb5de7f06d6157cd727d7e5a9c3abfa9fca68ff0f758ce3ce87f3fc391b2
SHA512b0c7063e6ec7dc26243720283f4a2ccaca6995e6d146c9008cd87bb92414907a3768853f9a3c1658863ef54ab7cd7fcb82ac79b3b8a02afbc505dd1c9517c4f5
-
\Users\Admin\AppData\Local\Temp\kusajy.exeFilesize
663KB
MD50fe13542d30a738128c7a6f141a44575
SHA14b39e3c86ca7716e525339ab5fec7aa31f95bc04
SHA256ae13facb167f3c05fffcea4a95ffc1577891f894abe9a992c82f0e2723597ff6
SHA51271236388f16af5ed8cfe2d054fd960324da3789175f40186b753447b54abcf59f45716c779d86d614289fe0a8a06954d7391e8918121dbc500fae695be7b0cb0
-
\Users\Admin\AppData\Local\Temp\~DFA9F.tmpFilesize
673KB
MD5cdf79fc7723f3b67225e4f811a10d7bf
SHA1707e2673cd8c90118892f28999d78a5be628351c
SHA2562e7dcd7a82f444a6bcdd01c5f70ec29a961ee30619dbb133a738da6e75ad31c6
SHA51295e86af4868c0988333f43cc210ded8591fa8abd624f11f62640536d6aef23ef815083da514fa76a1f6b3bdb13cad86f9506034a066cd4191ef8b098cabbe7f0
-
memory/576-67-0x0000000000000000-mapping.dmp
-
memory/576-73-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/576-80-0x0000000003870000-0x00000000039AE000-memory.dmpFilesize
1.2MB
-
memory/576-75-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1320-81-0x0000000000400000-0x000000000053E000-memory.dmpFilesize
1.2MB
-
memory/1320-77-0x0000000000000000-mapping.dmp
-
memory/1332-70-0x0000000000000000-mapping.dmp
-
memory/1404-62-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1404-74-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1404-58-0x0000000000000000-mapping.dmp
-
memory/1816-71-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1816-64-0x0000000001D20000-0x0000000001DFE000-memory.dmpFilesize
888KB
-
memory/1816-57-0x0000000001D20000-0x0000000001DFE000-memory.dmpFilesize
888KB
-
memory/1816-55-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1816-63-0x0000000000400000-0x00000000004DE000-memory.dmpFilesize
888KB
-
memory/1816-54-0x0000000075511000-0x0000000075513000-memory.dmpFilesize
8KB