Analysis
-
max time kernel
255s -
max time network
334s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 04:26
Static task
static1
Behavioral task
behavioral1
Sample
8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe
Resource
win10v2004-20221111-en
General
-
Target
8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe
-
Size
25KB
-
MD5
89d2df8ec6758be24d8f4dfad9f04af1
-
SHA1
0f48e6fd47d1781eb06f9811c8cd97ee49a638be
-
SHA256
8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f
-
SHA512
ff0184c0bb7b4560d18c4ecd59d84b1be5b80b5de4c29b8616e8838072fccb562342032a97feb97ff659965192844147e037cac07e3dcaba6471cad52880488f
-
SSDEEP
384:TQagXZPRlOjTh4wdTDRnWAiBUiQSZmG4ge9OslgOSLJlg23f4I7I8XAw:TCwdTDRnnFiQSZigeMs+O+Jlg2QxuAw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
fjtbg.exefjtbg.exepid process 1264 fjtbg.exe 604 fjtbg.exe -
Deletes itself 1 IoCs
Processes:
fjtbg.exepid process 604 fjtbg.exe -
Loads dropped DLL 3 IoCs
Processes:
8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exefjtbg.exepid process 1516 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 1516 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 1264 fjtbg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exefjtbg.exedescription pid process target process PID 1168 set thread context of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1264 set thread context of 604 1264 fjtbg.exe fjtbg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exefjtbg.exedescription pid process target process PID 1168 wrote to memory of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1168 wrote to memory of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1168 wrote to memory of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1168 wrote to memory of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1168 wrote to memory of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1168 wrote to memory of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1168 wrote to memory of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1168 wrote to memory of 1516 1168 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe PID 1516 wrote to memory of 1264 1516 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe fjtbg.exe PID 1516 wrote to memory of 1264 1516 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe fjtbg.exe PID 1516 wrote to memory of 1264 1516 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe fjtbg.exe PID 1516 wrote to memory of 1264 1516 8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe fjtbg.exe PID 1264 wrote to memory of 604 1264 fjtbg.exe fjtbg.exe PID 1264 wrote to memory of 604 1264 fjtbg.exe fjtbg.exe PID 1264 wrote to memory of 604 1264 fjtbg.exe fjtbg.exe PID 1264 wrote to memory of 604 1264 fjtbg.exe fjtbg.exe PID 1264 wrote to memory of 604 1264 fjtbg.exe fjtbg.exe PID 1264 wrote to memory of 604 1264 fjtbg.exe fjtbg.exe PID 1264 wrote to memory of 604 1264 fjtbg.exe fjtbg.exe PID 1264 wrote to memory of 604 1264 fjtbg.exe fjtbg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe"C:\Users\Admin\AppData\Local\Temp\8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe"C:\Users\Admin\AppData\Local\Temp\8d71ab765fdf187446aedc65f6a4dc7c579d28d33a02c8f6b3acffc627dd794f.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fjtbg.exe"C:\Users\Admin\AppData\Local\Temp\fjtbg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fjtbg.exe"C:\Users\Admin\AppData\Local\Temp\fjtbg.exe"4⤵
- Executes dropped EXE
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fjtbg.exeFilesize
25KB
MD5a85c3be51ed5bab2baedc64ac101b318
SHA162d4be17735822209981ff001006f4b6ce111947
SHA256883cd4316017f70a2a37c0a6723c196875b7de7e5bba594fe70c1c75435a0b4c
SHA512c0ae2b59c28b4bc5fefbfc563dff9fdf056d7f68e984aa6a601a0e2658a915092cba91dda7b3afce0113fef46e3748a58e557f083586b39e9e28d9be228f3a76
-
C:\Users\Admin\AppData\Local\Temp\fjtbg.exeFilesize
25KB
MD5a85c3be51ed5bab2baedc64ac101b318
SHA162d4be17735822209981ff001006f4b6ce111947
SHA256883cd4316017f70a2a37c0a6723c196875b7de7e5bba594fe70c1c75435a0b4c
SHA512c0ae2b59c28b4bc5fefbfc563dff9fdf056d7f68e984aa6a601a0e2658a915092cba91dda7b3afce0113fef46e3748a58e557f083586b39e9e28d9be228f3a76
-
C:\Users\Admin\AppData\Local\Temp\fjtbg.exeFilesize
25KB
MD5a85c3be51ed5bab2baedc64ac101b318
SHA162d4be17735822209981ff001006f4b6ce111947
SHA256883cd4316017f70a2a37c0a6723c196875b7de7e5bba594fe70c1c75435a0b4c
SHA512c0ae2b59c28b4bc5fefbfc563dff9fdf056d7f68e984aa6a601a0e2658a915092cba91dda7b3afce0113fef46e3748a58e557f083586b39e9e28d9be228f3a76
-
\Users\Admin\AppData\Local\Temp\fjtbg.exeFilesize
25KB
MD5a85c3be51ed5bab2baedc64ac101b318
SHA162d4be17735822209981ff001006f4b6ce111947
SHA256883cd4316017f70a2a37c0a6723c196875b7de7e5bba594fe70c1c75435a0b4c
SHA512c0ae2b59c28b4bc5fefbfc563dff9fdf056d7f68e984aa6a601a0e2658a915092cba91dda7b3afce0113fef46e3748a58e557f083586b39e9e28d9be228f3a76
-
\Users\Admin\AppData\Local\Temp\fjtbg.exeFilesize
25KB
MD5a85c3be51ed5bab2baedc64ac101b318
SHA162d4be17735822209981ff001006f4b6ce111947
SHA256883cd4316017f70a2a37c0a6723c196875b7de7e5bba594fe70c1c75435a0b4c
SHA512c0ae2b59c28b4bc5fefbfc563dff9fdf056d7f68e984aa6a601a0e2658a915092cba91dda7b3afce0113fef46e3748a58e557f083586b39e9e28d9be228f3a76
-
\Users\Admin\AppData\Local\Temp\fjtbg.exeFilesize
25KB
MD5a85c3be51ed5bab2baedc64ac101b318
SHA162d4be17735822209981ff001006f4b6ce111947
SHA256883cd4316017f70a2a37c0a6723c196875b7de7e5bba594fe70c1c75435a0b4c
SHA512c0ae2b59c28b4bc5fefbfc563dff9fdf056d7f68e984aa6a601a0e2658a915092cba91dda7b3afce0113fef46e3748a58e557f083586b39e9e28d9be228f3a76
-
memory/1168-54-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1168-56-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1264-62-0x0000000000000000-mapping.dmp
-
memory/1264-68-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1516-58-0x0000000075551000-0x0000000075553000-memory.dmpFilesize
8KB
-
memory/1516-59-0x0000000000400000-0x0000000000403000-memory.dmpFilesize
12KB
-
memory/1516-55-0x0000000000400000-0x0000000000403000-memory.dmpFilesize
12KB