Analysis
-
max time kernel
144s -
max time network
175s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 06:22
Behavioral task
behavioral1
Sample
29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe
Resource
win10v2004-20220901-en
General
-
Target
29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe
-
Size
120KB
-
MD5
addab1c297f678b00958d6564b785dca
-
SHA1
b5abef2ce28ef39a8400d77dfc875cf02f1f798a
-
SHA256
29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e
-
SHA512
f031e53fa165a6f1324169ae26f34d52d5207aaf9f2887547c6fff0e869babb5ec8581daa115582ec98b9690eced3f2cafc0ec057226127adcc925287de2385f
-
SSDEEP
3072:6JwejfQQpiipQpU1EgKOCHYk05GPqAzVQuLQ/eO:6vxV1COCHvQ8qABQ2GB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Ciypmcm.exepid process 560 Ciypmcm.exe -
Processes:
resource yara_rule behavioral1/memory/2028-54-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect behavioral1/memory/2028-57-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect behavioral1/memory/2028-58-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect C:\Program Files (x86)\Windows Mgvqqz\Ciypmcm.exe vmprotect behavioral1/memory/560-61-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect C:\Program Files (x86)\Windows Mgvqqz\Ciypmcm.exe vmprotect behavioral1/memory/560-63-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect behavioral1/memory/560-64-0x0000000000400000-0x0000000000441000-memory.dmp vmprotect -
Drops file in Program Files directory 2 IoCs
Processes:
29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exedescription ioc process File created C:\Program Files (x86)\Windows Mgvqqz\Ciypmcm.exe 29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe File opened for modification C:\Program Files (x86)\Windows Mgvqqz\Ciypmcm.exe 29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exeCiypmcm.exepid process 2028 29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe 560 Ciypmcm.exe 2028 29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Ciypmcm.exedescription pid process Token: SeDebugPrivilege 560 Ciypmcm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe"C:\Users\Admin\AppData\Local\Temp\29b513fdbbe72c15a6961af6af3e758d8eefbc22753de155d2c1f0b0b954660e.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\6975.vbs"2⤵
-
C:\Program Files (x86)\Windows Mgvqqz\Ciypmcm.exe"C:\Program Files (x86)\Windows Mgvqqz\Ciypmcm.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Windows Mgvqqz\Ciypmcm.exeFilesize
100.1MB
MD554703ea5a3c9d059614034fba856634c
SHA1802e56e6fd5302bf661d1ef35648c0053be1617f
SHA256650a741d2dce8360d13d81663d0de757a85baeed6034838fc88a201fc1a4d5e6
SHA5120a132cb24211f141fede8c2b43fee7c5884fa598239c18acb3ba474081b2033e2f22852af7c293445942c86463c92ff1c6a3d0d5fdf41f1df953ed7d2aced6d9
-
C:\Program Files (x86)\Windows Mgvqqz\Ciypmcm.exeFilesize
100.1MB
MD554703ea5a3c9d059614034fba856634c
SHA1802e56e6fd5302bf661d1ef35648c0053be1617f
SHA256650a741d2dce8360d13d81663d0de757a85baeed6034838fc88a201fc1a4d5e6
SHA5120a132cb24211f141fede8c2b43fee7c5884fa598239c18acb3ba474081b2033e2f22852af7c293445942c86463c92ff1c6a3d0d5fdf41f1df953ed7d2aced6d9
-
memory/560-61-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/560-63-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/560-64-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2028-54-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2028-56-0x0000000075531000-0x0000000075533000-memory.dmpFilesize
8KB
-
memory/2028-57-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2028-58-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB