Analysis
-
max time kernel
219s -
max time network
238s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:07
Static task
static1
Behavioral task
behavioral1
Sample
20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe
Resource
win10v2004-20221111-en
General
-
Target
20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe
-
Size
679KB
-
MD5
42fd316c685fd6af4108ea0e93f44b50
-
SHA1
c7a0bb9607dcca3f0707ce551cb24df187f5989c
-
SHA256
20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2
-
SHA512
b5293145f4a352ae65ed00907fd7c4864d8624fd8315d9ce2c7af969f6fa0741ef7c797abbe0b989714088dbd3c9b765b3f5598d425601192a6fa0e52c3aa187
-
SSDEEP
12288:VHjcoe9PH96vB/fAuBcm9TyOE/xG3muGx44MG4Yx:VDgINfAuBcgcZG2uG24MG4Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
rodyfyb.exe~DFAF1.tmpypsomub.exepid process 1904 rodyfyb.exe 1844 ~DFAF1.tmp 1476 ypsomub.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1032 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exerodyfyb.exe~DFAF1.tmppid process 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe 1904 rodyfyb.exe 1844 ~DFAF1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
ypsomub.exepid process 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe 1476 ypsomub.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
~DFAF1.tmpdescription pid process Token: SeDebugPrivilege 1844 ~DFAF1.tmp -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exerodyfyb.exe~DFAF1.tmpdescription pid process target process PID 668 wrote to memory of 1904 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe rodyfyb.exe PID 668 wrote to memory of 1904 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe rodyfyb.exe PID 668 wrote to memory of 1904 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe rodyfyb.exe PID 668 wrote to memory of 1904 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe rodyfyb.exe PID 1904 wrote to memory of 1844 1904 rodyfyb.exe ~DFAF1.tmp PID 1904 wrote to memory of 1844 1904 rodyfyb.exe ~DFAF1.tmp PID 1904 wrote to memory of 1844 1904 rodyfyb.exe ~DFAF1.tmp PID 1904 wrote to memory of 1844 1904 rodyfyb.exe ~DFAF1.tmp PID 668 wrote to memory of 1032 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe cmd.exe PID 668 wrote to memory of 1032 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe cmd.exe PID 668 wrote to memory of 1032 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe cmd.exe PID 668 wrote to memory of 1032 668 20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe cmd.exe PID 1844 wrote to memory of 1476 1844 ~DFAF1.tmp ypsomub.exe PID 1844 wrote to memory of 1476 1844 ~DFAF1.tmp ypsomub.exe PID 1844 wrote to memory of 1476 1844 ~DFAF1.tmp ypsomub.exe PID 1844 wrote to memory of 1476 1844 ~DFAF1.tmp ypsomub.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe"C:\Users\Admin\AppData\Local\Temp\20fdf7447d55afd9c277cb130d1b2b2e2f3b29cd7ce1ff71e22195300c58c7a2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\rodyfyb.exeC:\Users\Admin\AppData\Local\Temp\rodyfyb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\~DFAF1.tmpC:\Users\Admin\AppData\Local\Temp\~DFAF1.tmp OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\ypsomub.exe"C:\Users\Admin\AppData\Local\Temp\ypsomub.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- Deletes itself
PID:1032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD586d200d1708ff1de414aaec5fbf799b3
SHA12e262e2fce91dc3efee2f4fb6fb4048f203f45af
SHA256e59d365160d71293b3473d6baac4a951ed90072201f409e9c781d8949383f88c
SHA512eee8055e87ff4c852dc47f60514da8c40859069dfb36edd62728542c1907189c8702323cfaecbff14c6ed6e40b86ce31d63d9b39eade243f4c2fcecfec0e1c7a
-
Filesize
104B
MD586bb2dbeaef655893262f3c041f6afe2
SHA11b26ff1241c1353bd506c18bd0c11878076ba65d
SHA2564a57643d2c59d1235bc0926f845583f39345839e3e9428ad619eb4b6baf96ad2
SHA51258294cfaa5882a4c5625c03fe6f9e4882912b31f7169241f95626745d66c0a746083a9044365943d66ae7a420113d28c0ddd642c4ed697c683deb63796a13d31
-
Filesize
480B
MD5c54f659ac8336c4433f23a8b395f0288
SHA1996aaad936a27e866f545be9793d840e8cd958ab
SHA25649b57148468a840257168fc4e92d7db0c9cbeb98f60680f58055292d60484861
SHA51285f471cbc0ecfe76bff9603c8bb58636fe2b91b014d93aeee7efcfc5bf1143e1a5a0e70661b2e30fc79abebe8627d56d1a1bd32e5cf73cd79aadf3a53c1506ba
-
Filesize
681KB
MD5963b8cb06cd8fc98b62895e891c7f024
SHA19a9ec1d925b2e754ffbf6849436c0a246ff1aff9
SHA256987e9f0ddb50c8940c2dc56f243501bf743f06e2bdf8f533bfbdecff30739959
SHA512a701221fa2585b883a5ee3ee3a657927ad6f17083ce47eb847a8ce65964e489b7f1cab013e35ebfc154c6499bada47ddaf8d4d9515887d878e70798ece5b5da9
-
Filesize
681KB
MD5963b8cb06cd8fc98b62895e891c7f024
SHA19a9ec1d925b2e754ffbf6849436c0a246ff1aff9
SHA256987e9f0ddb50c8940c2dc56f243501bf743f06e2bdf8f533bfbdecff30739959
SHA512a701221fa2585b883a5ee3ee3a657927ad6f17083ce47eb847a8ce65964e489b7f1cab013e35ebfc154c6499bada47ddaf8d4d9515887d878e70798ece5b5da9
-
Filesize
419KB
MD5a8b385f4141a3473a76b64750f32a698
SHA1a465c714e7f14e4af17c2569348de9ad08341d60
SHA256f0bf1f4d339cbd5df42c73a9850f5113b01786fe798084961fb70c3353a80d38
SHA512a64de127a90ddd4dfc4377621179cbb8aec3bf4d3d87fee444026e4f05bc9b016c5333431ea236fc86aab54d87bd00c0c980044607f5fc16e6f7965c943caf93
-
Filesize
683KB
MD50d10987cc1efcf67f22bae3ad55c2391
SHA13636f81bd9f9039e24339f2dd43c32d9db17324a
SHA256b57e06b608014b4064723c1042ffa1eae27b7cb2ba9dcb6c88891e0a89b11000
SHA512385a2cd30d4f57fe6f36d3aef5113dcc8f229eab5368baefc23fcfe9d8dbfe135f6e967b183bf59c9cfe903f8c2f8b233d70435c3375ec7e002d7b5bea3af190
-
Filesize
681KB
MD5963b8cb06cd8fc98b62895e891c7f024
SHA19a9ec1d925b2e754ffbf6849436c0a246ff1aff9
SHA256987e9f0ddb50c8940c2dc56f243501bf743f06e2bdf8f533bfbdecff30739959
SHA512a701221fa2585b883a5ee3ee3a657927ad6f17083ce47eb847a8ce65964e489b7f1cab013e35ebfc154c6499bada47ddaf8d4d9515887d878e70798ece5b5da9
-
Filesize
419KB
MD5a8b385f4141a3473a76b64750f32a698
SHA1a465c714e7f14e4af17c2569348de9ad08341d60
SHA256f0bf1f4d339cbd5df42c73a9850f5113b01786fe798084961fb70c3353a80d38
SHA512a64de127a90ddd4dfc4377621179cbb8aec3bf4d3d87fee444026e4f05bc9b016c5333431ea236fc86aab54d87bd00c0c980044607f5fc16e6f7965c943caf93
-
Filesize
683KB
MD50d10987cc1efcf67f22bae3ad55c2391
SHA13636f81bd9f9039e24339f2dd43c32d9db17324a
SHA256b57e06b608014b4064723c1042ffa1eae27b7cb2ba9dcb6c88891e0a89b11000
SHA512385a2cd30d4f57fe6f36d3aef5113dcc8f229eab5368baefc23fcfe9d8dbfe135f6e967b183bf59c9cfe903f8c2f8b233d70435c3375ec7e002d7b5bea3af190