Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 17:04
Behavioral task
behavioral1
Sample
e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe
Resource
win10v2004-20220812-en
General
-
Target
e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe
-
Size
9KB
-
MD5
02e01ff5d773b712af0c303324a878e1
-
SHA1
bc681c1ca5b03d6b04eaa3773b27381e30c71c34
-
SHA256
e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba
-
SHA512
ee47176f3aa6a7ea8062e580b326052f0bc8e1dfcc26e24f0aa9159003f7f59085173682a742aaa72b8d4e242c2a619646293603413e6d6c17f7ded7ec5131cc
-
SSDEEP
192:o8gs3oUVAegFqY6EnR6UqEyncjWOS7E25Qg57Qe2XV14r:aDUVlVsnAdnP7EEQZTar
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/532-55-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/532-57-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2044 532 WerFault.exe 26 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "îÝìæ×ÒÒÆÄÆÈØæ¡—×ÔÕžn±ÛÍ¡o¯" e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 532 wrote to memory of 2044 532 e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe 28 PID 532 wrote to memory of 2044 532 e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe 28 PID 532 wrote to memory of 2044 532 e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe 28 PID 532 wrote to memory of 2044 532 e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe"C:\Users\Admin\AppData\Local\Temp\e03ce97fee17366a0211d08ba554ca3e0581e88d43bfa0c9de2345d17fc8b9ba.exe"1⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 5242⤵
- Program crash
PID:2044
-