Analysis
-
max time kernel
143s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 07:20
Behavioral task
behavioral1
Sample
fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe
Resource
win10v2004-20221111-en
General
-
Target
fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe
-
Size
1.3MB
-
MD5
aac9adcb3be1b04126298549f47a61ed
-
SHA1
f2de6c733816b7492fe14b793600e51e9e2949d2
-
SHA256
fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782
-
SHA512
f7b0fd1e3bf6c962ca55463f999a93b3e23b9073e833cef65a2aba1bf1f4cab9d8777a09773ad53d7a756c036d4425b5fc42ffe2d3323a83a917b0dc3eb94ea3
-
SSDEEP
24576:gxcRI1NSSx+6ZQK0EqhShkYwFBXF8IJzYe6t/scHDZEFyoC/MBM4q5BPqDnAZL:gV1PxHiK0EWSwrBRK/scdEEoQMBq5lH
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
31EA.tmpWUU.exepid process 1724 31EA.tmp 464 1604 WUU.exe -
Processes:
resource yara_rule behavioral1/memory/1832-55-0x0000000000D50000-0x0000000000EA3000-memory.dmp vmprotect behavioral1/memory/1832-67-0x0000000000D50000-0x0000000000EA3000-memory.dmp vmprotect -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1512 cmd.exe -
Loads dropped DLL 3 IoCs
Processes:
fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exepid process 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe 464 -
Drops file in System32 directory 2 IoCs
Processes:
31EA.tmpdescription ioc process File created C:\Windows\system32\WUU.exe 31EA.tmp File opened for modification C:\Windows\system32\WUU.exe 31EA.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exepid process 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe31EA.tmpdescription pid process target process PID 1832 wrote to memory of 1724 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe 31EA.tmp PID 1832 wrote to memory of 1724 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe 31EA.tmp PID 1832 wrote to memory of 1724 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe 31EA.tmp PID 1832 wrote to memory of 1724 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe 31EA.tmp PID 1832 wrote to memory of 1512 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe cmd.exe PID 1832 wrote to memory of 1512 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe cmd.exe PID 1832 wrote to memory of 1512 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe cmd.exe PID 1832 wrote to memory of 1512 1832 fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe cmd.exe PID 1724 wrote to memory of 1588 1724 31EA.tmp cmd.exe PID 1724 wrote to memory of 1588 1724 31EA.tmp cmd.exe PID 1724 wrote to memory of 1588 1724 31EA.tmp cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe"C:\Users\Admin\AppData\Local\Temp\fbdaf2303420e54eee343ada4a4debca8addd7c8af49c536a27413560245d782.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\31EA.tmp"C:\Users\Admin\AppData\Local\Temp\31EA.tmp"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3341.tmp.bat" "3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\322A.tmp.bat" "2⤵
- Deletes itself
-
C:\Windows\system32\WUU.exeC:\Windows\system32\WUU.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\31EA.tmpFilesize
309KB
MD5d431aca4af67918e4b98ae9123e2d7ea
SHA1964c9cd02f7ccfa538237197a14d3c7de56cf8ed
SHA256bf1519788b803625bc1c420690e4032c139b0c28450e4e823f464e431d974969
SHA51266637426153b14afc8068c2b11e6aa500cb1b6556ec4b0ac4f3460f497be7e1b0ee773129b44159938f8b516225d5efe478899b2e15e00949a838e9ff84dd91f
-
C:\Users\Admin\AppData\Local\Temp\31EA.tmpFilesize
309KB
MD5d431aca4af67918e4b98ae9123e2d7ea
SHA1964c9cd02f7ccfa538237197a14d3c7de56cf8ed
SHA256bf1519788b803625bc1c420690e4032c139b0c28450e4e823f464e431d974969
SHA51266637426153b14afc8068c2b11e6aa500cb1b6556ec4b0ac4f3460f497be7e1b0ee773129b44159938f8b516225d5efe478899b2e15e00949a838e9ff84dd91f
-
C:\Users\Admin\AppData\Local\Temp\322A.tmp.batFilesize
306B
MD56ca51da9aa95c29fc29853d6ff1a5a64
SHA1fbeff33dfa7a5410d912258b0a85f7bc9a24e76b
SHA256b85224282343ddaeb077856f24d89160a1c01bdcec671464d00dc07367c49472
SHA5124cbb6c0861ef2fa02c1205694caa6f9f2eda72fec8a480ebc23c2cb31a05c566c0b21a87e856dd28c9cf82aa12f04564eac77e34829b022e6cb5a4ab6619c16f
-
C:\Users\Admin\AppData\Local\Temp\3341.tmp.batFilesize
186B
MD5a0c445a556441e278362417c7442acd3
SHA117bd29f5779791255d7e50944ce0c62b45bbd732
SHA256f2911095ae095a188b4cdbfc3015ce5a5155904cd18d7b1ff0fb597e4e9e9ce8
SHA5124f8284ac7fe36ba72aa0d69a256b19e036be1f2774853fc017a3065260d78f3e0118ff6cd3268a891a158aa102cca2f5f43f7f79835bc4984fc8c7f588d5c783
-
C:\Windows\System32\WUU.exeFilesize
309KB
MD5d431aca4af67918e4b98ae9123e2d7ea
SHA1964c9cd02f7ccfa538237197a14d3c7de56cf8ed
SHA256bf1519788b803625bc1c420690e4032c139b0c28450e4e823f464e431d974969
SHA51266637426153b14afc8068c2b11e6aa500cb1b6556ec4b0ac4f3460f497be7e1b0ee773129b44159938f8b516225d5efe478899b2e15e00949a838e9ff84dd91f
-
\Users\Admin\AppData\Local\Temp\31EA.tmpFilesize
309KB
MD5d431aca4af67918e4b98ae9123e2d7ea
SHA1964c9cd02f7ccfa538237197a14d3c7de56cf8ed
SHA256bf1519788b803625bc1c420690e4032c139b0c28450e4e823f464e431d974969
SHA51266637426153b14afc8068c2b11e6aa500cb1b6556ec4b0ac4f3460f497be7e1b0ee773129b44159938f8b516225d5efe478899b2e15e00949a838e9ff84dd91f
-
\Users\Admin\AppData\Local\Temp\31EA.tmpFilesize
309KB
MD5d431aca4af67918e4b98ae9123e2d7ea
SHA1964c9cd02f7ccfa538237197a14d3c7de56cf8ed
SHA256bf1519788b803625bc1c420690e4032c139b0c28450e4e823f464e431d974969
SHA51266637426153b14afc8068c2b11e6aa500cb1b6556ec4b0ac4f3460f497be7e1b0ee773129b44159938f8b516225d5efe478899b2e15e00949a838e9ff84dd91f
-
\Windows\System32\WUU.exeFilesize
309KB
MD5d431aca4af67918e4b98ae9123e2d7ea
SHA1964c9cd02f7ccfa538237197a14d3c7de56cf8ed
SHA256bf1519788b803625bc1c420690e4032c139b0c28450e4e823f464e431d974969
SHA51266637426153b14afc8068c2b11e6aa500cb1b6556ec4b0ac4f3460f497be7e1b0ee773129b44159938f8b516225d5efe478899b2e15e00949a838e9ff84dd91f
-
\Windows\System32\WUU.exeFilesize
309KB
MD5d431aca4af67918e4b98ae9123e2d7ea
SHA1964c9cd02f7ccfa538237197a14d3c7de56cf8ed
SHA256bf1519788b803625bc1c420690e4032c139b0c28450e4e823f464e431d974969
SHA51266637426153b14afc8068c2b11e6aa500cb1b6556ec4b0ac4f3460f497be7e1b0ee773129b44159938f8b516225d5efe478899b2e15e00949a838e9ff84dd91f
-
memory/1512-65-0x0000000000000000-mapping.dmp
-
memory/1588-66-0x0000000000000000-mapping.dmp
-
memory/1724-58-0x0000000000000000-mapping.dmp
-
memory/1724-64-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmpFilesize
8KB
-
memory/1832-54-0x00000000751A1000-0x00000000751A3000-memory.dmpFilesize
8KB
-
memory/1832-67-0x0000000000D50000-0x0000000000EA3000-memory.dmpFilesize
1.3MB
-
memory/1832-55-0x0000000000D50000-0x0000000000EA3000-memory.dmpFilesize
1.3MB