Analysis

  • max time kernel
    118s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 15:08

General

  • Target

    d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe

  • Size

    238KB

  • MD5

    b4c09f813a2fffe61e7a04649b5c0db1

  • SHA1

    146063c158f97d436a2110ddb84a6416abb11731

  • SHA256

    d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d

  • SHA512

    36832f2538a8df7b7038395e807c07f229f1a6c3b7c4a47412984956cc5ddc70bec9d0697c4917e82993c753159d7fe89ab460b713ee1b37713468c8598a5966

  • SSDEEP

    3072:pBAp5XhKpN4eOyVTGfhEClj8jTk+0hUy8FlDv+Cgw5CKHm:sbXE9OiTGfhEClq9v1mJJUm

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe
    "C:\Users\Admin\AppData\Local\Temp\d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat" "
      2⤵
      • Drops file in Drivers directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs"
        3⤵
        • Blocklisted process makes network request
        PID:1144
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs"
      2⤵
      • Drops file in Drivers directory
      PID:1436

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\net takoi papki\slonopotam\1.txt

          Filesize

          27B

          MD5

          213c0742081a9007c9093a01760f9f8c

          SHA1

          df53bb518c732df777b5ce19fc7c02dcb2f9d81b

          SHA256

          9681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69

          SHA512

          55182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9

        • C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs

          Filesize

          671B

          MD5

          883c99d0602a0248f896317e963ee7ba

          SHA1

          f204193192006ea7f975fa080d1a420af7f500ee

          SHA256

          dac9e827119af4cd5ce8821d256658fdcbdf256a4127a2c0e02fdbaf35243d48

          SHA512

          89cd0ffaedde4eecd3d9bcd7bcff51629092933899b158d0696675a2aa60590018add3cd40b7dd21e69cfaaf3fa6b71d4ce50fe582e4f2f94044f5e3cb2b0755

        • C:\Program Files (x86)\net takoi papki\slonopotam\industrialgasturbines.and

          Filesize

          62B

          MD5

          de82684480a421adb43faa8a0f0ba90c

          SHA1

          1753245ba7ccb497dc2f80b50bbd77ad5ab3233f

          SHA256

          5c69612291a7268a23b641da68e3b481898aead68e7656ff0d40ce7a26346f9d

          SHA512

          83d96ba49175fb930595f0535be64408ee7b763c2234bbdd5e5c20dea86ae9b59e38b122b5a67884b8a88f6a8de4cdb8edb2901fa870841bc4f1c17ed518429c

        • C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.day

          Filesize

          237B

          MD5

          9f07b6a20ca85c215e2a66ac5076ad6b

          SHA1

          a4f9928e681d949cedac2d69d0e2820a98512484

          SHA256

          94096e56760f6f1693f4f60cc057ef0a028e35c83e0168fc53e05a6e07a5bdc7

          SHA512

          6ea9ae4d83cb7bd29582513ab3f16a364ea70acc4e2754d47fe8032fb192b0d92e59e4044c2fa4b2858b8de019a7976fa1930ed081bbd2fee8104bbd61199db0

        • C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs

          Filesize

          237B

          MD5

          9f07b6a20ca85c215e2a66ac5076ad6b

          SHA1

          a4f9928e681d949cedac2d69d0e2820a98512484

          SHA256

          94096e56760f6f1693f4f60cc057ef0a028e35c83e0168fc53e05a6e07a5bdc7

          SHA512

          6ea9ae4d83cb7bd29582513ab3f16a364ea70acc4e2754d47fe8032fb192b0d92e59e4044c2fa4b2858b8de019a7976fa1930ed081bbd2fee8104bbd61199db0

        • C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat

          Filesize

          1KB

          MD5

          29f119693ca214cfaa1239411fcde132

          SHA1

          656c004c01513f8289f891b9865ade0a078d83d7

          SHA256

          453a179b4a60799f00ce28a4f95660e20246e778507706e968b61a3094353a8b

          SHA512

          d8bdc360f51cc082d290e2d525acaec9453368ac108a75bbfcbcda4a099d3bc7c7f1b17bf69a8ba33cacc3effa3b78c13c64924b800328d9fca454cb462aa792

        • memory/1140-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

          Filesize

          8KB