Analysis
-
max time kernel
118s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe
Resource
win10v2004-20220812-en
General
-
Target
d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe
-
Size
238KB
-
MD5
b4c09f813a2fffe61e7a04649b5c0db1
-
SHA1
146063c158f97d436a2110ddb84a6416abb11731
-
SHA256
d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d
-
SHA512
36832f2538a8df7b7038395e807c07f229f1a6c3b7c4a47412984956cc5ddc70bec9d0697c4917e82993c753159d7fe89ab460b713ee1b37713468c8598a5966
-
SSDEEP
3072:pBAp5XhKpN4eOyVTGfhEClj8jTk+0hUy8FlDv+Cgw5CKHm:sbXE9OiTGfhEClq9v1mJJUm
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 1144 WScript.exe 7 1144 WScript.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.ini d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.day d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.exe d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\1.txt d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\1.txt d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\industrialgasturbines.and d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\Uninstall.exe d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.day d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\industrialgasturbines.and d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe File created C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs cmd.exe File opened for modification C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1464 1140 d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe 27 PID 1140 wrote to memory of 1464 1140 d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe 27 PID 1140 wrote to memory of 1464 1140 d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe 27 PID 1140 wrote to memory of 1464 1140 d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe 27 PID 1464 wrote to memory of 1144 1464 cmd.exe 29 PID 1464 wrote to memory of 1144 1464 cmd.exe 29 PID 1464 wrote to memory of 1144 1464 cmd.exe 29 PID 1464 wrote to memory of 1144 1464 cmd.exe 29 PID 1140 wrote to memory of 1436 1140 d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe 30 PID 1140 wrote to memory of 1436 1140 d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe 30 PID 1140 wrote to memory of 1436 1140 d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe 30 PID 1140 wrote to memory of 1436 1140 d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe"C:\Users\Admin\AppData\Local\Temp\d35cb14938abf1a4cf388e0665d34c4c61b3008a7c2a70bb70348bd19ceaa60d.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\net takoi papki\slonopotam\slonopotamus.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\net takoi papki\slonopotam\jolemansday.vbs"3⤵
- Blocklisted process makes network request
PID:1144
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\net takoi papki\slonopotam\hreansdva.vbs"2⤵
- Drops file in Drivers directory
PID:1436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
671B
MD5883c99d0602a0248f896317e963ee7ba
SHA1f204193192006ea7f975fa080d1a420af7f500ee
SHA256dac9e827119af4cd5ce8821d256658fdcbdf256a4127a2c0e02fdbaf35243d48
SHA51289cd0ffaedde4eecd3d9bcd7bcff51629092933899b158d0696675a2aa60590018add3cd40b7dd21e69cfaaf3fa6b71d4ce50fe582e4f2f94044f5e3cb2b0755
-
Filesize
62B
MD5de82684480a421adb43faa8a0f0ba90c
SHA11753245ba7ccb497dc2f80b50bbd77ad5ab3233f
SHA2565c69612291a7268a23b641da68e3b481898aead68e7656ff0d40ce7a26346f9d
SHA51283d96ba49175fb930595f0535be64408ee7b763c2234bbdd5e5c20dea86ae9b59e38b122b5a67884b8a88f6a8de4cdb8edb2901fa870841bc4f1c17ed518429c
-
Filesize
237B
MD59f07b6a20ca85c215e2a66ac5076ad6b
SHA1a4f9928e681d949cedac2d69d0e2820a98512484
SHA25694096e56760f6f1693f4f60cc057ef0a028e35c83e0168fc53e05a6e07a5bdc7
SHA5126ea9ae4d83cb7bd29582513ab3f16a364ea70acc4e2754d47fe8032fb192b0d92e59e4044c2fa4b2858b8de019a7976fa1930ed081bbd2fee8104bbd61199db0
-
Filesize
237B
MD59f07b6a20ca85c215e2a66ac5076ad6b
SHA1a4f9928e681d949cedac2d69d0e2820a98512484
SHA25694096e56760f6f1693f4f60cc057ef0a028e35c83e0168fc53e05a6e07a5bdc7
SHA5126ea9ae4d83cb7bd29582513ab3f16a364ea70acc4e2754d47fe8032fb192b0d92e59e4044c2fa4b2858b8de019a7976fa1930ed081bbd2fee8104bbd61199db0
-
Filesize
1KB
MD529f119693ca214cfaa1239411fcde132
SHA1656c004c01513f8289f891b9865ade0a078d83d7
SHA256453a179b4a60799f00ce28a4f95660e20246e778507706e968b61a3094353a8b
SHA512d8bdc360f51cc082d290e2d525acaec9453368ac108a75bbfcbcda4a099d3bc7c7f1b17bf69a8ba33cacc3effa3b78c13c64924b800328d9fca454cb462aa792