Analysis
-
max time kernel
57s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe
Resource
win10v2004-20221111-en
General
-
Target
345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe
-
Size
180KB
-
MD5
fa3a46faf0d30fbf4405a36873f1693e
-
SHA1
0c214841f143763bc2e64af6963cf2cfc6be2bce
-
SHA256
345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7
-
SHA512
b54bca88477b49b03f84517cff7dd09d8277f7338588121a56ce135358b8799a98dcab2fc83e63baaf8789dcb3c50cfbb1a48927ba8ff966df07ff1875e14f63
-
SSDEEP
3072:bBAp5XhKpN4eOyVTGfhEClj8jTk+0hQZDO0REkyx2dBp/4luaMyzPviMKT:GbXE9OiTGfhEClq9PUgEkyQdBp/4luRH
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1952 WScript.exe 4 1952 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\The first evidence\Guatemala\ee1\she.he 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe File opened for modification C:\Program Files (x86)\The first evidence\Guatemala\08a4415e9d594ff960030b921d42b91e.bat 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe File opened for modification C:\Program Files (x86)\The first evidence\Guatemala\ee1\63c4da4fde984fa5c719cdcf2147ab7f.vbs 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe File opened for modification C:\Program Files (x86)\The first evidence\Guatemala\ee1\87dba6b5e5e739d7a8506bbceb19e4be.vbs 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 900 wrote to memory of 316 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 27 PID 900 wrote to memory of 316 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 27 PID 900 wrote to memory of 316 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 27 PID 900 wrote to memory of 316 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 27 PID 900 wrote to memory of 1952 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 29 PID 900 wrote to memory of 1952 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 29 PID 900 wrote to memory of 1952 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 29 PID 900 wrote to memory of 1952 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 29 PID 900 wrote to memory of 1964 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 30 PID 900 wrote to memory of 1964 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 30 PID 900 wrote to memory of 1964 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 30 PID 900 wrote to memory of 1964 900 345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe"C:\Users\Admin\AppData\Local\Temp\345bd2f1681b190b8ec182aba16e00ea3494665200c57e03fc1f0bb1ae7876f7.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\The first evidence\Guatemala\08a4415e9d594ff960030b921d42b91e.bat" "2⤵
- Drops file in Drivers directory
PID:316
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\The first evidence\Guatemala\ee1\63c4da4fde984fa5c719cdcf2147ab7f.vbs"2⤵
- Blocklisted process makes network request
PID:1952
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\The first evidence\Guatemala\ee1\87dba6b5e5e739d7a8506bbceb19e4be.vbs"2⤵
- Drops file in Drivers directory
PID:1964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5fdc435649c20bf019fabb7a2c6f7aabb
SHA12b1e9e1c29515cd56129b1124927cd4191b1e0a3
SHA256679f6db234acb119fa878ca5fe011c95f5b51e345871d006746aa0d1f8986a07
SHA5123c9db3c1064e8b79a1460bdf047de9cf0a6e135f75e015cef3c1adfdb5b16c927284f318e55945d90d3fd484c589ee225c726bcf8c49bb64914addc9be081eac
-
Filesize
492B
MD5a50ef4bd6a9d2d35f847044eed40ea56
SHA1f3be1f876a8fcbe2748a7a313abcc72ae37451ec
SHA2567e888c2cfef575e8515a651760cfa66a8261dab7024819acf347786e3352d6b8
SHA512ca6e775ffc73888b0d72028c62962111a334c7b1dd5db824d30a50f2a615559f80c533e485866516010288cf662db91841f930dc93e3e2fbd5601a77033d0d2d
-
Filesize
632B
MD5d04bbcc23db21b329b70ba8740f38793
SHA16356ce4b1e6790a6c5dac29a78bfe3020c15bd25
SHA256411d941431b1b9bb910dd01113a322bfbba3e3636221fc48c883ae66b2ecff58
SHA512bfd7cca3fbba2050b4ae46370f00ca009660893b286e2ff2f84405c978ac25a6cd35334b6b603f8422d4531675c84ce6f63205e8d3925406cb2213c001463996
-
Filesize
88B
MD59b85b710213b0976251c59371062b411
SHA17f138cf9dc12bade492e113c647504e729d42644
SHA25601f8589b96008e5e9c5002d126e3c4523e6ee00c955026b9f34f2e3b9cdae252
SHA512fc2ec6400b0f75e1656ce49a7d0d40f66589b6da65f73a40d4fc3d98e69a5a1087a58ac58c342fb98d7a92d4d203c9852619a2985c2691f61caad85dd9f8251d
-
Filesize
1KB
MD5be7b308dd01558f918f24e2b2a2bd77a
SHA1086e02425ae3a7be9c0a64ad6c50620d41de99b7
SHA256f6eb0e132fc049be3d6003e1a12c865eb504e54eeea5f69ee77decdec48ec567
SHA512d82903af3836441c3cd687dfac023e6e5fea50099ce1f48723a16091f39bbcf81f2191d099d2746c56843357b4e77b6f937b16299e80072ed0a4aab4d9efa713