Analysis
-
max time kernel
163s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
intimacao.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
intimacao.exe
Resource
win10v2004-20220812-en
General
-
Target
intimacao.exe
-
Size
349KB
-
MD5
4a5fceb31fa87e620a4bca365c5c7e5b
-
SHA1
4dd5d2c4edd696d0beab5802d965b9002d6f50fc
-
SHA256
4f52ed1a531999d1304eb8837a393fcde8f6d20f38bbff295e5e62156009ef27
-
SHA512
1f7c048649805a118e4ccc807fc4ba9d1567bcc289d724eb0a4ab31ce0ccdb1f7f9687d7b1e224b894463d5576bb3af72bea0aa46b0a7c66521c5c92f6b43537
-
SSDEEP
6144:VwHysA4gTF5arWEXCi4xD/K3enNbeAvXNsmaMSu1xWbLc8tEU59b0x45vp:+A4gTCr7DITsMNnPNsma3429bbB
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3600-134-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral2/memory/3600-135-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral2/memory/3600-136-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral2/memory/3600-137-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral2/memory/3600-138-0x0000000000400000-0x0000000000500000-memory.dmp upx behavioral2/memory/3600-139-0x0000000000400000-0x0000000000500000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
intimacao.exepid process 2296 intimacao.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
intimacao.exedescription pid process target process PID 2296 set thread context of 3600 2296 intimacao.exe intimacao.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
intimacao.exedescription pid process target process PID 2296 wrote to memory of 3600 2296 intimacao.exe intimacao.exe PID 2296 wrote to memory of 3600 2296 intimacao.exe intimacao.exe PID 2296 wrote to memory of 3600 2296 intimacao.exe intimacao.exe PID 2296 wrote to memory of 3600 2296 intimacao.exe intimacao.exe PID 2296 wrote to memory of 3600 2296 intimacao.exe intimacao.exe PID 2296 wrote to memory of 3600 2296 intimacao.exe intimacao.exe PID 2296 wrote to memory of 3600 2296 intimacao.exe intimacao.exe PID 2296 wrote to memory of 3600 2296 intimacao.exe intimacao.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\intimacao.exe"C:\Users\Admin\AppData\Local\Temp\intimacao.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\intimacao.exe"C:\Users\Admin\AppData\Local\Temp\intimacao.exe"2⤵PID:3600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD596e470ce27bcb5d204b5a69fdd30416a
SHA158f25d93b4d1dd3f309dab5d8dbdb7607948ac9f
SHA2569e06f35e8383c29db6478e54b9b2b008945889730bfaf70143e1ac526bbbf08b
SHA512546bd8e369bab8d808c8e5670090ed064f09d44611bca1d1df7a9cc9464080bacda66b04a8e8078a6976172a11087bb847193782b5aaabde9d28040803b973b8