Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 21:29
Static task
static1
Behavioral task
behavioral1
Sample
1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe
Resource
win10v2004-20221111-en
General
-
Target
1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe
-
Size
4.1MB
-
MD5
c554f5bc12ea046ad9722ff24ce5bb0f
-
SHA1
e729d5931f379aab9c9949732ddb43107270899a
-
SHA256
1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b
-
SHA512
6398d6a4ea0d94772097a12fe6de12d23b49453c2b1285d4342be4f4b7b39bef8df3132e65b20f73159bc67880ceccde2f98ba700ebd40d13dc68610e9429e11
-
SSDEEP
98304:sZUg5LFvJOTI6UPap4L9NpOlnlwtHTKrvATuE:25SInk4L9jglwtz2ATuE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
game.exepid process 1692 game.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\game.exe vmprotect \Users\Admin\AppData\Local\Temp\game.exe vmprotect \Users\Admin\AppData\Local\Temp\game.exe vmprotect \Users\Admin\AppData\Local\Temp\game.exe vmprotect C:\Users\Admin\AppData\Local\Temp\game.exe vmprotect behavioral1/memory/1692-62-0x0000000000400000-0x0000000004FEE000-memory.dmp vmprotect -
Loads dropped DLL 4 IoCs
Processes:
1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exepid process 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exedescription pid process target process PID 1088 wrote to memory of 1692 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe game.exe PID 1088 wrote to memory of 1692 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe game.exe PID 1088 wrote to memory of 1692 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe game.exe PID 1088 wrote to memory of 1692 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe game.exe PID 1088 wrote to memory of 1692 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe game.exe PID 1088 wrote to memory of 1692 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe game.exe PID 1088 wrote to memory of 1692 1088 1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe game.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe"C:\Users\Admin\AppData\Local\Temp\1bda31487ac5e04d007f0e2268a19544de8ede84df20008be1185c0034b1119b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\game.exe"C:\Users\Admin\AppData\Local\Temp\game.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\game.exeFilesize
1.8MB
MD5fa83d865f371b5a64faa264a10cc979e
SHA1eb2d288ecfc3be8a36ab2412c4d3c14bbabd0fcb
SHA25635a8876085092daa949be4417aaa805f574bb104c739cd15a2370e87b0042626
SHA512503493705aa22d1d6fde915805bba1eafc7808a6b881ac7945df00525a1d04a5a0256e8476f1503c48158e7809ebe1d90f0e7a99da2766e2887ac54d6cfa177f
-
\Users\Admin\AppData\Local\Temp\game.exeFilesize
1.8MB
MD5fa83d865f371b5a64faa264a10cc979e
SHA1eb2d288ecfc3be8a36ab2412c4d3c14bbabd0fcb
SHA25635a8876085092daa949be4417aaa805f574bb104c739cd15a2370e87b0042626
SHA512503493705aa22d1d6fde915805bba1eafc7808a6b881ac7945df00525a1d04a5a0256e8476f1503c48158e7809ebe1d90f0e7a99da2766e2887ac54d6cfa177f
-
\Users\Admin\AppData\Local\Temp\game.exeFilesize
1.8MB
MD5fa83d865f371b5a64faa264a10cc979e
SHA1eb2d288ecfc3be8a36ab2412c4d3c14bbabd0fcb
SHA25635a8876085092daa949be4417aaa805f574bb104c739cd15a2370e87b0042626
SHA512503493705aa22d1d6fde915805bba1eafc7808a6b881ac7945df00525a1d04a5a0256e8476f1503c48158e7809ebe1d90f0e7a99da2766e2887ac54d6cfa177f
-
\Users\Admin\AppData\Local\Temp\game.exeFilesize
1.8MB
MD5fa83d865f371b5a64faa264a10cc979e
SHA1eb2d288ecfc3be8a36ab2412c4d3c14bbabd0fcb
SHA25635a8876085092daa949be4417aaa805f574bb104c739cd15a2370e87b0042626
SHA512503493705aa22d1d6fde915805bba1eafc7808a6b881ac7945df00525a1d04a5a0256e8476f1503c48158e7809ebe1d90f0e7a99da2766e2887ac54d6cfa177f
-
\Users\Admin\AppData\Local\Temp\game.exeFilesize
1.8MB
MD5fa83d865f371b5a64faa264a10cc979e
SHA1eb2d288ecfc3be8a36ab2412c4d3c14bbabd0fcb
SHA25635a8876085092daa949be4417aaa805f574bb104c739cd15a2370e87b0042626
SHA512503493705aa22d1d6fde915805bba1eafc7808a6b881ac7945df00525a1d04a5a0256e8476f1503c48158e7809ebe1d90f0e7a99da2766e2887ac54d6cfa177f
-
memory/1088-54-0x0000000076681000-0x0000000076683000-memory.dmpFilesize
8KB
-
memory/1692-59-0x0000000000000000-mapping.dmp
-
memory/1692-62-0x0000000000400000-0x0000000004FEE000-memory.dmpFilesize
75.9MB