Analysis
-
max time kernel
37s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 06:13
Behavioral task
behavioral1
Sample
e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe
Resource
win10v2004-20220812-en
General
-
Target
e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe
-
Size
114KB
-
MD5
01ee180c315d0f6fa41f20a1f3ed33f0
-
SHA1
b8fc4a4197a23703e0063ad4ad51b734687803d6
-
SHA256
e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371
-
SHA512
1180e29d757d683661617388507f044b94ca07838dc4e0d6d7caff75bf6ec655743383b12b87458fbe0ac85ef5132783c480f43bccc016db88cd89e064f1caa2
-
SSDEEP
1536:P7L0gUavuPbzRUSdxRWs+LM2GjbQwTxrPwhwF9gukRuY5Q:TIg7vuzzQM1QwVPw4gukRua
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1872-55-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Processes:
resource yara_rule C:\Program Files\Monday.ime vmprotect \Program Files\Monday.ime vmprotect -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1452 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exepid process 1504 rundll32.exe 1504 rundll32.exe -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" rundll32.exe -
Drops file in System32 directory 3 IoCs
Processes:
e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exedescription ioc process File created C:\Windows\SysWOW64\sfcos.dll e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe File opened for modification C:\Windows\SysWOW64\sfcos.dll e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe File created C:\Windows\SysWOW64\systemp e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe -
Drops file in Program Files directory 6 IoCs
Processes:
e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exedescription ioc process File created C:\Program Files\Tuesday.ime e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe File created C:\Program Files\Wednesday.ime e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe File created C:\Program Files\Sunday.ime e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe File created C:\Program Files\taskmgr.upx e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe File opened for modification C:\Program Files\Saturday e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe File created C:\Program Files\Monday.ime e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1336 1504 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
rundll32.exepid process 1504 rundll32.exe 1504 rundll32.exe 1504 rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.execmd.exerundll32.exedescription pid process target process PID 1872 wrote to memory of 1896 1872 e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe sfc.exe PID 1872 wrote to memory of 1896 1872 e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe sfc.exe PID 1872 wrote to memory of 1896 1872 e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe sfc.exe PID 1872 wrote to memory of 1896 1872 e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe sfc.exe PID 1872 wrote to memory of 1452 1872 e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe cmd.exe PID 1872 wrote to memory of 1452 1872 e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe cmd.exe PID 1872 wrote to memory of 1452 1872 e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe cmd.exe PID 1872 wrote to memory of 1452 1872 e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe cmd.exe PID 1452 wrote to memory of 1504 1452 cmd.exe rundll32.exe PID 1452 wrote to memory of 1504 1452 cmd.exe rundll32.exe PID 1452 wrote to memory of 1504 1452 cmd.exe rundll32.exe PID 1452 wrote to memory of 1504 1452 cmd.exe rundll32.exe PID 1452 wrote to memory of 1504 1452 cmd.exe rundll32.exe PID 1452 wrote to memory of 1504 1452 cmd.exe rundll32.exe PID 1452 wrote to memory of 1504 1452 cmd.exe rundll32.exe PID 1504 wrote to memory of 1336 1504 rundll32.exe WerFault.exe PID 1504 wrote to memory of 1336 1504 rundll32.exe WerFault.exe PID 1504 wrote to memory of 1336 1504 rundll32.exe WerFault.exe PID 1504 wrote to memory of 1336 1504 rundll32.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe"C:\Users\Admin\AppData\Local\Temp\e0207a9257e33ccd5fa9816be1c47628b69e61ce7d83880434005dbd9c257371.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sfc.exe"C:\Windows\system32\sfc.exe" /REVERT2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c c:\del.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Program Files\Monday.ime",Runed3⤵
- Loads dropped DLL
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 2604⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Monday.imeFilesize
23KB
MD558040443232918af2ff04a8bd82cdac0
SHA130e6fc2f3ec0de36a8c67d943c6771034177617e
SHA256cce7e85cea31c7277d5dd5199db69a7be3754477a342500bb5e6b8c88f8b4cb7
SHA512acf3a69b0fef4724cac660e16206cd4056565b3ad901a63c639d22b72c15f5bd784af3bd629543d6f05a5de14b78cf95bb77d62671f0295d813061a6463059ca
-
C:\Windows\SysWOW64\sfcos.dllFilesize
40KB
MD584799328d87b3091a3bdd251e1ad31f9
SHA164dbbe8210049f4d762de22525a7fe4313bf99d0
SHA256f85521215924388830dbb13580688db70b46af4c7d82d549d09086438f8d237b
SHA5120a9401c9c687f0edca01258c7920596408934caa21e5392dbaefc222c5c021255a40ec7c114a805cdb7f5a6153ec9fa9592edcc9e45406ce5612aa4e3da6a2c4
-
C:\Windows\SysWOW64\systempFilesize
4KB
MD5390a723071ff83760f669d65bade0ad6
SHA1e9a07e9a91708634ea986ca31c6471b75402a3ae
SHA25650ed8f234a125b1e1430923e2d29afb241e965eb4edf36f41cea56032c8009b0
SHA512a44d5e2f74b0692ec10209c675de0e1c82c147d9887011a848a80d123349b61db9df00b209a0323ee27d1c7ea6ae525cef1790b792a6fb9f46188b13ae8eca33
-
\??\c:\del.batFilesize
306B
MD532b9b10b9ffa6974224679a874b68d4c
SHA194a74f48607091435597b4a858128dcdd529f1c7
SHA256d6844f99a80f339e1a2f5aaf4a76a9f7f6918232c723c7573c21482cb48eb8f9
SHA512bfe076475ca5791ee99602b36b8d15cec8c20e5c6bf1cff8901894677a187046b11d80d128ad4df2d896eaf90c8514b045971535b5e6cf8dc3dd41020b56d24c
-
\Program Files\Monday.imeFilesize
23KB
MD558040443232918af2ff04a8bd82cdac0
SHA130e6fc2f3ec0de36a8c67d943c6771034177617e
SHA256cce7e85cea31c7277d5dd5199db69a7be3754477a342500bb5e6b8c88f8b4cb7
SHA512acf3a69b0fef4724cac660e16206cd4056565b3ad901a63c639d22b72c15f5bd784af3bd629543d6f05a5de14b78cf95bb77d62671f0295d813061a6463059ca
-
\Windows\SysWOW64\sfcos.dllFilesize
40KB
MD584799328d87b3091a3bdd251e1ad31f9
SHA164dbbe8210049f4d762de22525a7fe4313bf99d0
SHA256f85521215924388830dbb13580688db70b46af4c7d82d549d09086438f8d237b
SHA5120a9401c9c687f0edca01258c7920596408934caa21e5392dbaefc222c5c021255a40ec7c114a805cdb7f5a6153ec9fa9592edcc9e45406ce5612aa4e3da6a2c4
-
memory/1336-66-0x0000000000000000-mapping.dmp
-
memory/1452-57-0x0000000000000000-mapping.dmp
-
memory/1504-59-0x0000000000000000-mapping.dmp
-
memory/1872-54-0x0000000075841000-0x0000000075843000-memory.dmpFilesize
8KB
-
memory/1872-55-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1896-56-0x0000000000000000-mapping.dmp