Analysis
-
max time kernel
46s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 02:39
Static task
static1
Behavioral task
behavioral1
Sample
2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe
Resource
win10v2004-20221111-en
General
-
Target
2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe
-
Size
571KB
-
MD5
ddc2bdd1851d6d064f63d17ee5b19e2c
-
SHA1
c18f6b3b04bd8f4e721f6bc81ccf6d6a697cad14
-
SHA256
2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab
-
SHA512
08fb95e78b12441035a8aef283d220e41da8f78e7fde9c375ab32a18821915decfccb20a53757cc4840de083fdc70540a22bc1e2894090958cee6a0119dc2fd6
-
SSDEEP
12288:8JYWSbl0beVWj/6//wL0d/lTNR1RDPm+iMrYYdJ16DPR+xUUbEr:8iObYW2//i0bNR1Q+iEXcZqUr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 688 makejob.exe -
Deletes itself 1 IoCs
pid Process 1304 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1096 cmd.exe 1096 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ucheck = "\"C:\\Users\\Admin\\AppData\\Roaming\\temp\\makejob.exe\" -tn \"Update checker\" -ds \"Adobe Update Validation Checker\" -tr \"C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Updates\\Services.exe\" -sc \"MINUTE\" -mo \"30\" " makejob.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1096 1248 2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe 28 PID 1248 wrote to memory of 1096 1248 2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe 28 PID 1248 wrote to memory of 1096 1248 2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe 28 PID 1248 wrote to memory of 1096 1248 2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe 28 PID 1096 wrote to memory of 688 1096 cmd.exe 30 PID 1096 wrote to memory of 688 1096 cmd.exe 30 PID 1096 wrote to memory of 688 1096 cmd.exe 30 PID 1096 wrote to memory of 688 1096 cmd.exe 30 PID 1248 wrote to memory of 1304 1248 2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe 31 PID 1248 wrote to memory of 1304 1248 2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe 31 PID 1248 wrote to memory of 1304 1248 2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe 31 PID 1248 wrote to memory of 1304 1248 2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe"C:\Users\Admin\AppData\Local\Temp\2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\temp\checkrun.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Roaming\temp\makejob.exemakejob.exe -is ucheck -tn "Update checker" -ds "Adobe Update Validation Checker" -tr "C:\Users\Admin\AppData\Roaming\Adobe\Updates\Services.exe" -sc MINUTE -mo 303⤵
- Executes dropped EXE
- Adds Run key to start application
PID:688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\temp\end.bat" "C:\Users\Admin\AppData\Local\Temp\2de677c2ed2fe1e2ae3410582198f74119f24a512fac7768156cb9dfdbeb3cab.exe""2⤵
- Deletes itself
PID:1304
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5c6ecf4889c11cdd0fbc1fba386bff47f
SHA16b5ca84806966db8a8fc4ab4f84974f140a516a7
SHA25629ffe21a9ed2cffa3dc9a724346b1f113ce78fc3150bf2c0d047a7b89e57edcd
SHA5121072aada0eb0b1b1f19e68797da379eea2f73a138931a9fb3597124e7f20dd381d98c7c4cce4bf9e60ee39df2d8fedce937c05357fb044b504171d29fa03a494
-
Filesize
354B
MD530297c668c73d482c5606a12fc1c85f1
SHA1fe1e30c3389e75d211172b55bd25f528419e869d
SHA256d7d7694657aa04fe463bebe843cdedcf26fd22f05add4bd65331deabfda25b88
SHA5126a50b00c0bdc95d600dd4bc63f58bf020efebaf0f36290eb88de65eef54217054de0bee863905b58a88460ab019d851b116dcf4884390fac9250092ee4717431
-
Filesize
68B
MD5c55a47701a471702af217c16224964e0
SHA1329fa22bb3f2d84f02b5f66b385e6ee678c959f8
SHA256a9adfc8c078eece80223839ef3192ceb374ffc512d55cb39213909d81e5d988e
SHA51239f38d2d2a3ced3d69c5e4d2545fb33da1ad56dc94c03b221d6ee6e4aee7614cedb2092fdf60a91137b534aa859976709f8c02b8c872339a7a2cfbea6d672b28
-
Filesize
511KB
MD5482b902b7b2e4c67162e79d1be20f914
SHA1101f7f8c245abc32b9d333d5c01e065b2b1babbc
SHA256c6e4e8b47ae3325ce37364116eaea18519b3d979b36a0dd4de38f6f62a9f6302
SHA512fbe2daa8844a236da643d0038b36cc726d74881778cfcad4ffebffc9439c2d28ce3989d8f6dc87530c665bfd9661c57a986a6569236ae86dc5b770c7598e1a46
-
Filesize
511KB
MD5482b902b7b2e4c67162e79d1be20f914
SHA1101f7f8c245abc32b9d333d5c01e065b2b1babbc
SHA256c6e4e8b47ae3325ce37364116eaea18519b3d979b36a0dd4de38f6f62a9f6302
SHA512fbe2daa8844a236da643d0038b36cc726d74881778cfcad4ffebffc9439c2d28ce3989d8f6dc87530c665bfd9661c57a986a6569236ae86dc5b770c7598e1a46
-
Filesize
511KB
MD5482b902b7b2e4c67162e79d1be20f914
SHA1101f7f8c245abc32b9d333d5c01e065b2b1babbc
SHA256c6e4e8b47ae3325ce37364116eaea18519b3d979b36a0dd4de38f6f62a9f6302
SHA512fbe2daa8844a236da643d0038b36cc726d74881778cfcad4ffebffc9439c2d28ce3989d8f6dc87530c665bfd9661c57a986a6569236ae86dc5b770c7598e1a46
-
Filesize
511KB
MD5482b902b7b2e4c67162e79d1be20f914
SHA1101f7f8c245abc32b9d333d5c01e065b2b1babbc
SHA256c6e4e8b47ae3325ce37364116eaea18519b3d979b36a0dd4de38f6f62a9f6302
SHA512fbe2daa8844a236da643d0038b36cc726d74881778cfcad4ffebffc9439c2d28ce3989d8f6dc87530c665bfd9661c57a986a6569236ae86dc5b770c7598e1a46