Analysis
-
max time kernel
1629s -
max time network
1635s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe
Resource
win10v2004-20221111-en
General
-
Target
82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe
-
Size
5.2MB
-
MD5
65bc10aa24d76ec1b02a151a16d053c0
-
SHA1
81bfa89a47ef789ea1cc5c98f02df2bc2a038a4e
-
SHA256
82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150
-
SHA512
b0e22e0050090d6f8bc9ae8291005e406d3ab3ea60976aa9394f2c37f59645d8df0ddca7dfe927b0f604428092778da3a3a968da11bc73ea042dfc87d7b9d298
-
SSDEEP
98304:VXISESTXsUp7ZcjxlqSs/eAFe6WgdLzjnezZED:Vr5sjjxcz20pz6zZm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 752 quegego fatilila voy boji.exe -
Deletes itself 1 IoCs
pid Process 1124 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1772 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1988 PING.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 752 quegego fatilila voy boji.exe 752 quegego fatilila voy boji.exe 752 quegego fatilila voy boji.exe 752 quegego fatilila voy boji.exe 752 quegego fatilila voy boji.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 960 wrote to memory of 1772 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 29 PID 960 wrote to memory of 1772 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 29 PID 960 wrote to memory of 1772 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 29 PID 960 wrote to memory of 1772 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 29 PID 960 wrote to memory of 752 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 31 PID 960 wrote to memory of 752 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 31 PID 960 wrote to memory of 752 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 31 PID 960 wrote to memory of 752 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 31 PID 960 wrote to memory of 1124 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 32 PID 960 wrote to memory of 1124 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 32 PID 960 wrote to memory of 1124 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 32 PID 960 wrote to memory of 1124 960 82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe 32 PID 1124 wrote to memory of 1952 1124 cmd.exe 34 PID 1124 wrote to memory of 1952 1124 cmd.exe 34 PID 1124 wrote to memory of 1952 1124 cmd.exe 34 PID 1124 wrote to memory of 1952 1124 cmd.exe 34 PID 1124 wrote to memory of 1988 1124 cmd.exe 35 PID 1124 wrote to memory of 1988 1124 cmd.exe 35 PID 1124 wrote to memory of 1988 1124 cmd.exe 35 PID 1124 wrote to memory of 1988 1124 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe"C:\Users\Admin\AppData\Local\Temp\82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe"2⤵
- Creates scheduled task(s)
PID:1772
-
-
C:\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe"C:\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\82126fc4fd73e4fea6ee032f156572af9986acdc8c22f1f69253289a3b39b150.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1952
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe
Filesize779.2MB
MD5d713a98cd83caf2394109c50efee112e
SHA1d75e6cedf78c6af81f6ea3e6a625f5d86006e44b
SHA2569adca27d1327cd327b7ae388ddacbdbe84553abd4c0fbea4c68348712cca6d59
SHA512f166748dc529e4d75225850b06fc04370def8bbf11741d9856486431990af5e8d07d33f044e34b69a67c3cc8cd3daac19e07c2cfd822916d134ad8dd03a44f5a
-
\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe
Filesize779.2MB
MD5d713a98cd83caf2394109c50efee112e
SHA1d75e6cedf78c6af81f6ea3e6a625f5d86006e44b
SHA2569adca27d1327cd327b7ae388ddacbdbe84553abd4c0fbea4c68348712cca6d59
SHA512f166748dc529e4d75225850b06fc04370def8bbf11741d9856486431990af5e8d07d33f044e34b69a67c3cc8cd3daac19e07c2cfd822916d134ad8dd03a44f5a
-
\Users\Admin\vivaca loc kevilena xatequij nocolok_gijafe meci dokinori kikojiyi\quegego fatilila voy boji.exe
Filesize779.2MB
MD5d713a98cd83caf2394109c50efee112e
SHA1d75e6cedf78c6af81f6ea3e6a625f5d86006e44b
SHA2569adca27d1327cd327b7ae388ddacbdbe84553abd4c0fbea4c68348712cca6d59
SHA512f166748dc529e4d75225850b06fc04370def8bbf11741d9856486431990af5e8d07d33f044e34b69a67c3cc8cd3daac19e07c2cfd822916d134ad8dd03a44f5a