Analysis
-
max time kernel
4s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 11:39
Behavioral task
behavioral1
Sample
74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe
Resource
win10v2004-20221111-en
General
-
Target
74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe
-
Size
71KB
-
MD5
998782d6436daa9ea79cfbc7287089e1
-
SHA1
24480e6eb1604b8ade152fd365b3a4c339eca32c
-
SHA256
74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76
-
SHA512
68effa3626cb06f0ddff52bb6a8468a58a75217518808e5de58648eacd62cd642cd651fb50db52d59b61a31863e7f1dfe83360fed1af08de84167933274f636d
-
SSDEEP
1536:KQRJQxTWZE27YHJkuXEohW3b1wOKcUelGTDXs5GfiOqJJJ:KQRJQVWyoYpHXIqOJGTDc5ce7J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Server.exepid process 1328 Server.exe -
Loads dropped DLL 1 IoCs
Processes:
74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exepid process 956 74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1816 1328 WerFault.exe Server.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exeServer.exedescription pid process target process PID 956 wrote to memory of 1328 956 74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe Server.exe PID 956 wrote to memory of 1328 956 74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe Server.exe PID 956 wrote to memory of 1328 956 74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe Server.exe PID 956 wrote to memory of 1328 956 74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe Server.exe PID 1328 wrote to memory of 1816 1328 Server.exe WerFault.exe PID 1328 wrote to memory of 1816 1328 Server.exe WerFault.exe PID 1328 wrote to memory of 1816 1328 Server.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe"C:\Users\Admin\AppData\Local\Temp\74ce10e29960f6996cc7c51aa73eaa857cbdeaca42964e62ee06c6c60edc5b76.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1328 -s 6243⤵
- Program crash
PID:1816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5481f790c8caadb7049f86356258ed6b0
SHA15308e220e1db9393aceb9cb7089d4087d7689a44
SHA2563c15950b7c0aa0f2a81571e218f059fe0db9b7fa04c3fb6d6b674c1bb579c582
SHA51218748a743a389c67791c5506144f220d67fb1d919c69ca597162f45108022ced7086e175db3278036b34396bf3020f157badd8642ffc8557c0f28c2a9151e98f
-
Filesize
48KB
MD5481f790c8caadb7049f86356258ed6b0
SHA15308e220e1db9393aceb9cb7089d4087d7689a44
SHA2563c15950b7c0aa0f2a81571e218f059fe0db9b7fa04c3fb6d6b674c1bb579c582
SHA51218748a743a389c67791c5506144f220d67fb1d919c69ca597162f45108022ced7086e175db3278036b34396bf3020f157badd8642ffc8557c0f28c2a9151e98f
-
Filesize
48KB
MD5481f790c8caadb7049f86356258ed6b0
SHA15308e220e1db9393aceb9cb7089d4087d7689a44
SHA2563c15950b7c0aa0f2a81571e218f059fe0db9b7fa04c3fb6d6b674c1bb579c582
SHA51218748a743a389c67791c5506144f220d67fb1d919c69ca597162f45108022ced7086e175db3278036b34396bf3020f157badd8642ffc8557c0f28c2a9151e98f