Analysis
-
max time kernel
370s -
max time network
456s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 10:35
Static task
static1
Behavioral task
behavioral1
Sample
fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce.exe
Resource
win10v2004-20221111-en
General
-
Target
fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce.exe
-
Size
428KB
-
MD5
e4c3cfd84caa550e6f7e92ddd8ac7b52
-
SHA1
2d2bee826656e2d582744598efe9d72334c0831b
-
SHA256
fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce
-
SHA512
03b7af2670eafb867418c638316401b0c777cdd8343e631977e21194c6287aa5de98f8522237ea9e39c79c20813c76a00291c9b2806b2838e8838729cd6b3a02
-
SSDEEP
6144:zsaocyLCy4C96ZsuF8Yt06bpT761pGMhdjB7N/dxyPUdbof8BRylHyf7bepa2oh+:ztob+QuL06ZWpnjFJycRA8nyebeparh+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1756 installer.exe -
Loads dropped DLL 1 IoCs
pid Process 5104 fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini installer.exe File opened for modification C:\Windows\assembly\Desktop.ini installer.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly installer.exe File created C:\Windows\assembly\Desktop.ini installer.exe File opened for modification C:\Windows\assembly\Desktop.ini installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5104 wrote to memory of 1756 5104 fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce.exe 81 PID 5104 wrote to memory of 1756 5104 fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce.exe"C:\Users\Admin\AppData\Local\Temp\fbf20dfcc0d52e063780ada97ffe029769dbcb4347e4b3c5a3166d2bcadd77ce.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\nsk8C02.tmp\installer.exeC:\Users\Admin\AppData\Local\Temp\nsk8C02.tmp\installer.exe north.exe /dT132590155S /e10060591 /u50ae11c5-fa08-4f10-be2a-04b05bc06f2f2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
PID:1756
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5c56f474df7c7234370c88cef5e334752
SHA1ff7e59e76a0bbdef4243232786c0d86e9fbb22dd
SHA2562e2e482bbf7a109f2d7cc37a9657715ef133900c4af3b6e90da2842ad12d869d
SHA51279a56ef595b37009382e83fdb512ee9f57e13384060238d809f7d9564f85a2a3d5fd05d75a8de6c3851fe7ba80b7bd5936af4a345bc278cd42fa959f4ed52d6f
-
Filesize
175KB
MD5c56f474df7c7234370c88cef5e334752
SHA1ff7e59e76a0bbdef4243232786c0d86e9fbb22dd
SHA2562e2e482bbf7a109f2d7cc37a9657715ef133900c4af3b6e90da2842ad12d869d
SHA51279a56ef595b37009382e83fdb512ee9f57e13384060238d809f7d9564f85a2a3d5fd05d75a8de6c3851fe7ba80b7bd5936af4a345bc278cd42fa959f4ed52d6f
-
Filesize
8KB
MD5249ae678f0dac4c625c6de6aca53823a
SHA16ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201
SHA2567298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce
SHA51266e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7