Analysis
-
max time kernel
6s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe
Resource
win10v2004-20221111-en
General
-
Target
0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe
-
Size
589KB
-
MD5
0012e12d17f2a9116395ee5bd66ac26d
-
SHA1
e873b18aeac01a898e5438d8926c91f420036a0a
-
SHA256
0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74
-
SHA512
aa90f3df8ce8d617083e5a83c194664e8b6e61b597436c08223a5983409a0e998794e69fa1032ec480f3df180ffeee691541664b08f39097d0911601b100b8d1
-
SSDEEP
12288:gzy6rRxEwbpnfkjuVtPuVcG6YO/uV1ObuVtFnvysf1Q1TkAQTuiH7:z6rTnbp8iVtGVcG9pV1OqVtFnSQT3b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1748 wrote to memory of 700 1748 0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe 28 PID 1748 wrote to memory of 700 1748 0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe 28 PID 1748 wrote to memory of 700 1748 0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe 28 PID 1748 wrote to memory of 700 1748 0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe 28 PID 700 wrote to memory of 580 700 mshta.exe 29 PID 700 wrote to memory of 580 700 mshta.exe 29 PID 700 wrote to memory of 580 700 mshta.exe 29 PID 700 wrote to memory of 580 700 mshta.exe 29 PID 580 wrote to memory of 1696 580 cmd.exe 31 PID 580 wrote to memory of 1696 580 cmd.exe 31 PID 580 wrote to memory of 1696 580 cmd.exe 31 PID 580 wrote to memory of 1696 580 cmd.exe 31 PID 580 wrote to memory of 1020 580 cmd.exe 32 PID 580 wrote to memory of 1020 580 cmd.exe 32 PID 580 wrote to memory of 1020 580 cmd.exe 32 PID 580 wrote to memory of 1020 580 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe"C:\Users\Admin\AppData\Local\Temp\0443a03632997d289fe6f772017c8266e6fc73e9f667c4ee6d6389d2bd5a9a74.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('SOLA_2.0_10571531419233.bat',0);window.close()"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SOLA_2.0_10571531419233.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c date /t4⤵PID:1696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir C:\Windows\explorer.exe4⤵PID:1020
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD537965e063f11423a24314a76ff17f423
SHA1227136f2bfb46fd43a48038526434b7cf678f843
SHA256d27f1c5cd06bd860700b4ac4dac27b533c99ff26383c4a946e8f82b548b52a97
SHA5128911444a170e8e8e9da10d9503d3def3f86bbe814532b863f2755d486d37abe945a1eb666ecc6227eb320f6d10f4a06fa355903760a3c0c1110007e9840c96a0