Analysis
-
max time kernel
82s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe
Resource
win10v2004-20221111-en
General
-
Target
a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe
-
Size
180KB
-
MD5
cd6a000e663489f6a977e57fc50d8c28
-
SHA1
7240b6348a00e1f45757d3b36475634a03d69e95
-
SHA256
a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150
-
SHA512
08342125d441bbff4c4fe65aed51a69de8eaceb90e67225a6818f3fbda060d5259221c16f4ec553637f14e280783b65831c5dcba3d9637b3018222ed49849bc7
-
SSDEEP
3072:YBAp5XhKpN4eOyVTGfhEClj8jTk+0hW3iRyC/xu6zS91Oja1:PbXE9OiTGfhEClq9P3K/Q6zPja1
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1592 WScript.exe 5 1592 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\moskaraskakokokoko.hiq a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe File opened for modification C:\Program Files (x86)\v storonu\E230\10\EcuadoryGalapagos.bat a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\Latesttraveladvicefor.vbs a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\Simplyenteryouremailaddress.vbs a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1900 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 27 PID 1132 wrote to memory of 1900 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 27 PID 1132 wrote to memory of 1900 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 27 PID 1132 wrote to memory of 1900 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 27 PID 1132 wrote to memory of 1644 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 29 PID 1132 wrote to memory of 1644 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 29 PID 1132 wrote to memory of 1644 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 29 PID 1132 wrote to memory of 1644 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 29 PID 1132 wrote to memory of 1592 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 30 PID 1132 wrote to memory of 1592 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 30 PID 1132 wrote to memory of 1592 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 30 PID 1132 wrote to memory of 1592 1132 a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe"C:\Users\Admin\AppData\Local\Temp\a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\v storonu\E230\10\EcuadoryGalapagos.bat" "2⤵
- Drops file in Drivers directory
PID:1900
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\v storonu\E230\ultar\Latesttraveladvicefor.vbs"2⤵
- Drops file in Drivers directory
PID:1644
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\v storonu\E230\ultar\Simplyenteryouremailaddress.vbs"2⤵
- Blocklisted process makes network request
PID:1592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b45596645f8a658db976251e9ce5d7c7
SHA1bd0c84d84a76cc9e2358207ea03d3ab5a5dff035
SHA256702be40ef48db1290115c5dd05df6c9c94390a30c98cb5220ff7bf4990f733e8
SHA51232f48a74006833cdec21f9c052e087d6a2d9871a300254e89d099fd37ea020cfa4a76c7012c5beaa42a084a57759f2d16866bd24f5ccbe1e8a91199ce5097aa9
-
Filesize
809B
MD5a70692ab2116330248298ab46d71658e
SHA1a9894c3ae7849d53db122fddcb22d2f954015a77
SHA256bffc14839a75eab23e75d0dd831b4f0b8433fdbfb81ac6489288ac004ce5c025
SHA512c7839f4a5aff4c7b3ca67df7f6e168a34d39623070ab3e46d9ccf33462b1efd8b007ef185d4d863894ec63492595f4b1eb28d29c0930deb3ca50235d576b4f1a
-
Filesize
558B
MD5d839f13ade51408ab182246646f7223a
SHA12246609ea30998516fff536e0d71145421f745ce
SHA2562df0ed636eb52f9f65073cda0e155364349792a4be8259ec145e3b3600546086
SHA51254d757fb46b473d12d651087b6aefb6012f1bbde7a52cb8cb13e37f9168ac497154c59d79249fdde079dcfafaeca38fb6c04602a123382aa46fdc560812dae5b
-
Filesize
58B
MD5d823f748ed12d50c515876d46a705ae9
SHA1f0115bb382f99b6897474bcdf4dd70db049f7889
SHA256cdf198797a0863beeb6da7bf8e970881aae84676beaaf87a397d4d8ae6bfef3d
SHA51268181dde08d1dcdb3d4f1220d04a75c68b06c73fb71c130bf08776e56fe6080c4e14bea533592edbe2c5af8166f9ef756ff217cc83cb93158e73e093c9ce5c68
-
Filesize
1KB
MD561613a3238bf1eb1b636aec368429b88
SHA11cc7919e2e64245424c896d8d766106dd2adf52c
SHA256d103f25e2cbf2b0a9534536ad228c3c4ae46844c516ed9ecf4149d7b50bcebdd
SHA512cb50ebf01a92cd6a4540f5f1242b74b20b9220844189533cdf55bf33a755981000d0e3bb9d904ef657ca24c25a84b23dd7653193ccfbc0e833cf2f8565c5ff0f