Analysis
-
max time kernel
140s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 04:20
Static task
static1
Behavioral task
behavioral1
Sample
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe
Resource
win10v2004-20220812-en
General
-
Target
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe
-
Size
762KB
-
MD5
00e90026198266ac834b0dbcd9c4f838
-
SHA1
803603c0610b6e726edb201cb1fef3ad472a9afe
-
SHA256
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
-
SHA512
2ae4c9d4fd55215fffe592daf3770c5c91e9c7970748a575226f9ee7d6c9e760a95a74509f53cf8986988454741297ece90b9a33f8f74d37c6f974684fd2a2a9
-
SSDEEP
12288:aMmXLbRD6RGU2sTRL9JoCBGYLVvdq0xW1zoojZuKCPKSCOrPDQcciv9CUIyywCYp:tmXLbB6RG4TRXoCBGYLxxxW1soFurPK6
Malware Config
Extracted
C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DecryptAllFiles 7138621.txt
http://kurrmpfx6kgmsopm.onion
Extracted
C:\Users\Admin\Documents\zlwdkgg.html
http-equiv='Content-Type
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
pdfisga.exepdfisga.exepid process 1696 pdfisga.exe 1820 pdfisga.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
pdfisga.exedescription ioc process File renamed C:\Users\Admin\AppData\Local\Temp\0.tmp => C:\Users\Admin\Pictures\DismountOpen.raw.ctb2 pdfisga.exe File renamed C:\Users\Admin\AppData\Local\Temp\0.tmp => C:\Users\Admin\Pictures\GrantLimit.raw.ctb2 pdfisga.exe File renamed C:\Users\Admin\AppData\Local\Temp\0.tmp => C:\Users\Admin\Pictures\ReadClose.crw.ctb2 pdfisga.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exepdfisga.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe Key value queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Control Panel\International\Geo\Nation pdfisga.exe -
Loads dropped DLL 3 IoCs
Processes:
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exepdfisga.exepid process 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 1696 pdfisga.exe 1696 pdfisga.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exepdfisga.exedescription pid process target process PID 944 set thread context of 668 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe PID 1696 set thread context of 1820 1696 pdfisga.exe pdfisga.exe -
Drops file in Program Files directory 2 IoCs
Processes:
pdfisga.exedescription ioc process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DecryptAllFiles 7138621.txt pdfisga.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AllFilesAreLocked 7138621.bmp pdfisga.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1516 1400 WerFault.exe -
NSIS installer 8 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\pdfisga.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\pdfisga.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\pdfisga.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\pdfisga.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\pdfisga.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\pdfisga.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\pdfisga.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\pdfisga.exe nsis_installer_2 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
pdfisga.exepid process 1820 pdfisga.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
pdfisga.exepid process 1820 pdfisga.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exetaskeng.exepdfisga.exedescription pid process target process PID 944 wrote to memory of 668 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe PID 944 wrote to memory of 668 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe PID 944 wrote to memory of 668 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe PID 944 wrote to memory of 668 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe PID 944 wrote to memory of 668 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe PID 944 wrote to memory of 668 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe PID 944 wrote to memory of 668 944 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe 11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe PID 684 wrote to memory of 1696 684 taskeng.exe pdfisga.exe PID 684 wrote to memory of 1696 684 taskeng.exe pdfisga.exe PID 684 wrote to memory of 1696 684 taskeng.exe pdfisga.exe PID 684 wrote to memory of 1696 684 taskeng.exe pdfisga.exe PID 1696 wrote to memory of 1820 1696 pdfisga.exe pdfisga.exe PID 1696 wrote to memory of 1820 1696 pdfisga.exe pdfisga.exe PID 1696 wrote to memory of 1820 1696 pdfisga.exe pdfisga.exe PID 1696 wrote to memory of 1820 1696 pdfisga.exe pdfisga.exe PID 1696 wrote to memory of 1820 1696 pdfisga.exe pdfisga.exe PID 1696 wrote to memory of 1820 1696 pdfisga.exe pdfisga.exe PID 1696 wrote to memory of 1820 1696 pdfisga.exe pdfisga.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe"C:\Users\Admin\AppData\Local\Temp\11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe"C:\Users\Admin\AppData\Local\Temp\11090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61.exe"2⤵
- Checks computer location settings
PID:668
-
C:\Windows\system32\taskeng.exetaskeng.exe {2A25933A-3EC9-4124-ADBD-7AAF0557874B} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\pdfisga.exeC:\Users\Admin\AppData\Local\Temp\pdfisga.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\pdfisga.exe"C:\Users\Admin\AppData\Local\Temp\pdfisga.exe"3⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1820
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1400 -s 5921⤵
- Program crash
PID:1516
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
762KB
MD500e90026198266ac834b0dbcd9c4f838
SHA1803603c0610b6e726edb201cb1fef3ad472a9afe
SHA25611090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
SHA5122ae4c9d4fd55215fffe592daf3770c5c91e9c7970748a575226f9ee7d6c9e760a95a74509f53cf8986988454741297ece90b9a33f8f74d37c6f974684fd2a2a9
-
Filesize
762KB
MD500e90026198266ac834b0dbcd9c4f838
SHA1803603c0610b6e726edb201cb1fef3ad472a9afe
SHA25611090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
SHA5122ae4c9d4fd55215fffe592daf3770c5c91e9c7970748a575226f9ee7d6c9e760a95a74509f53cf8986988454741297ece90b9a33f8f74d37c6f974684fd2a2a9
-
Filesize
762KB
MD500e90026198266ac834b0dbcd9c4f838
SHA1803603c0610b6e726edb201cb1fef3ad472a9afe
SHA25611090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
SHA5122ae4c9d4fd55215fffe592daf3770c5c91e9c7970748a575226f9ee7d6c9e760a95a74509f53cf8986988454741297ece90b9a33f8f74d37c6f974684fd2a2a9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
654B
MD593b277a1188a454f2be34c0ccedd8430
SHA19fe81c4b6a97588722c584f631a3a333dcde6a12
SHA256dde23702a22a38c496ba46e3fc0a5902f3d847417f631051dba190250d68d630
SHA51212b2842d927b62de6b304985b405832718a71be6e06cb3a74ea7dfefa862fbb9bc00763930169a7cff07f010b51f42a57a4d7b1403c0d0c7658bfc9aebafdd0f
-
Filesize
118KB
MD5bee2bc7ca85e944a77dcf8be9bd8b7e1
SHA1561e8f534eb2da783e2aa72a678b4967d71bdf23
SHA2562b1c9ebd08e2c2286590e20f1777b07163dfa2706f12735a9317c3423ca71bf8
SHA51251e385786e6de3f8b432be3f9cff5709b3d059a9183314dc6f69ac8b19c0809622964471aac21f5f1a67b9fc888dc2ba9969d1e015bb4fbb93de18fb6251c90f
-
Filesize
118KB
MD5bee2bc7ca85e944a77dcf8be9bd8b7e1
SHA1561e8f534eb2da783e2aa72a678b4967d71bdf23
SHA2562b1c9ebd08e2c2286590e20f1777b07163dfa2706f12735a9317c3423ca71bf8
SHA51251e385786e6de3f8b432be3f9cff5709b3d059a9183314dc6f69ac8b19c0809622964471aac21f5f1a67b9fc888dc2ba9969d1e015bb4fbb93de18fb6251c90f
-
Filesize
762KB
MD500e90026198266ac834b0dbcd9c4f838
SHA1803603c0610b6e726edb201cb1fef3ad472a9afe
SHA25611090879de7060d1ffa3188e78af8a8e710488a9b9a1f67e147a39c218783b61
SHA5122ae4c9d4fd55215fffe592daf3770c5c91e9c7970748a575226f9ee7d6c9e760a95a74509f53cf8986988454741297ece90b9a33f8f74d37c6f974684fd2a2a9