Analysis
-
max time kernel
252s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe
Resource
win10v2004-20221111-en
General
-
Target
098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe
-
Size
327KB
-
MD5
a0ea780dfafd764bc6742aa3c230f16e
-
SHA1
24b4eca3a13490e5bdbef0f33dd89183427f3ca7
-
SHA256
098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450
-
SHA512
de3b6d406a55d4ef63edc06832fdc34d2e5b69269074d4cc5f5708fb056d690f689d74192fe9d6c4f311229c94f7988f1f42ef3134364647399004baf714e16c
-
SSDEEP
6144:Lu2urzh9xu/XkauJzxeUL1TjPcwNY27MxG1AVZJh0X/4To4NqB1cDNVqHw5smZ:Lutrzh9xOXkFxeUpTjjm27MgCVFGgTog
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 668 Browser.exe 584 svccost.exe 1684 Browser.exe 1292 svccost.exe -
resource yara_rule behavioral1/files/0x000b000000012320-55.dat upx behavioral1/files/0x000b000000012320-57.dat upx behavioral1/memory/668-64-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/files/0x000b000000012320-71.dat upx behavioral1/files/0x000b000000012320-73.dat upx -
Loads dropped DLL 10 IoCs
pid Process 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 668 Browser.exe 668 Browser.exe 584 svccost.exe 584 svccost.exe 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 904 cmd.exe 904 cmd.exe 1292 svccost.exe 1292 svccost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 680 wrote to memory of 668 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 28 PID 680 wrote to memory of 668 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 28 PID 680 wrote to memory of 668 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 28 PID 680 wrote to memory of 668 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 28 PID 680 wrote to memory of 668 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 28 PID 680 wrote to memory of 668 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 28 PID 680 wrote to memory of 668 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 28 PID 668 wrote to memory of 584 668 Browser.exe 29 PID 668 wrote to memory of 584 668 Browser.exe 29 PID 668 wrote to memory of 584 668 Browser.exe 29 PID 668 wrote to memory of 584 668 Browser.exe 29 PID 668 wrote to memory of 584 668 Browser.exe 29 PID 668 wrote to memory of 584 668 Browser.exe 29 PID 668 wrote to memory of 584 668 Browser.exe 29 PID 680 wrote to memory of 1684 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 31 PID 680 wrote to memory of 1684 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 31 PID 680 wrote to memory of 1684 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 31 PID 680 wrote to memory of 1684 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 31 PID 680 wrote to memory of 1684 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 31 PID 680 wrote to memory of 1684 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 31 PID 680 wrote to memory of 1684 680 098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe 31 PID 1684 wrote to memory of 904 1684 Browser.exe 32 PID 1684 wrote to memory of 904 1684 Browser.exe 32 PID 1684 wrote to memory of 904 1684 Browser.exe 32 PID 1684 wrote to memory of 904 1684 Browser.exe 32 PID 1684 wrote to memory of 904 1684 Browser.exe 32 PID 1684 wrote to memory of 904 1684 Browser.exe 32 PID 1684 wrote to memory of 904 1684 Browser.exe 32 PID 904 wrote to memory of 1292 904 cmd.exe 34 PID 904 wrote to memory of 1292 904 cmd.exe 34 PID 904 wrote to memory of 1292 904 cmd.exe 34 PID 904 wrote to memory of 1292 904 cmd.exe 34 PID 904 wrote to memory of 1292 904 cmd.exe 34 PID 904 wrote to memory of 1292 904 cmd.exe 34 PID 904 wrote to memory of 1292 904 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe"C:\Users\Admin\AppData\Local\Temp\098c682024dbb4c2737c07f35d98dbeda7a7ef5edcf52d1777a37a2f1c1e0450.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\MrDD21.tmp\Browser.exe"C:\Users\Admin\AppData\Local\Temp\MrDD21.tmp\Browser.exe" /NOCONSOLE svccost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\MrDD21.tmp\svccost.exesvccost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:584
-
-
-
C:\Users\Admin\AppData\Local\Temp\MrDD21.tmp\Browser.exe"C:\Users\Admin\AppData\Local\Temp\MrDD21.tmp\Browser.exe" /NOCONSOLE AnotherPerson.bat2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c AnotherPerson.bat3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\MrDD21.tmp\svccost.exesvccost.exe --algo=sha256d --url=http://paljacinke.aquarium-stakany.org:8332/ --user=d38a39ys_l3kpy --pass=fuckyousniff --4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1292
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD5de6f0fcd4edf6d058a16a0eb05059d73
SHA1df5ff15b89ecfdacd81387eb8e3cb3da429f0496
SHA2563dab99a075493d43ad275a9cee730097b8ee8be28c821353e9f0cbf09611a1b8
SHA512fde4eb039d6a96d2586fc48f7bc82e2bc3bede9dfde3ac050533bed794165f8e249db43b912c7157ca1a21f706973d04e5d204728fc92233efd477d2e724dc54
-
Filesize
36KB
MD526b429976e5fdf52e5755a5515364037
SHA10621a11789b078aa33bb245eadf197e0994b7fb5
SHA25614b6653b161d1a1090e757684f6e3e8f9ffaebb90d226d863871822a19ee65db
SHA512b3c6cdc5a0a65fb398c7449599cf10ecd8e9c8827156c05ad629f4f5ea24574747b18474c549dc84c34a6ec3b9ab098f8da7e10ddde46b1ba1a5044ad6984547
-
Filesize
36KB
MD526b429976e5fdf52e5755a5515364037
SHA10621a11789b078aa33bb245eadf197e0994b7fb5
SHA25614b6653b161d1a1090e757684f6e3e8f9ffaebb90d226d863871822a19ee65db
SHA512b3c6cdc5a0a65fb398c7449599cf10ecd8e9c8827156c05ad629f4f5ea24574747b18474c549dc84c34a6ec3b9ab098f8da7e10ddde46b1ba1a5044ad6984547
-
Filesize
295KB
MD56aa2534bce88c87f81344c37c857f863
SHA15f3b3b559e1e2ae1a3947537e30c266134017f98
SHA2564c1a15de636720aece3b967ce599468eae8a67a2d3cb9e00aa308f2b9f10e74a
SHA512a7950f05cbe3a3163d1f383395e2c41c42321042df29b141c1243c31e47118362e0aea8a81ccc0f56ae14a0914f246e10ced9be193ca9f65bc90d12f9b86c33a
-
Filesize
70KB
MD5492153d3b3f0fb99abd48752c8d2e796
SHA1dae87bee3d82a812cf321d933945647c4a63d854
SHA2563866bdf85958e47ab3110884035a74469fabe2495cf3cc64194d390211e312f5
SHA5123e4ee410bef252ae25a9c1065af196a41979c612478a5897c009ca25d23e9d45b091ca7787f43946aceed537a97299e97519c8bba3e79ab84205eb196c46d515
-
Filesize
170KB
MD5e02477250ec492c18a2073305b557fd3
SHA12e306243feefa9d04c87ca6cbfb9e5e9647defbc
SHA2568670d1587ed339719b495dca78e54e812efb6ce8bf263cdac3f3096f21a6f70e
SHA512c5a1f5dd77fd6ff1dda6f1d34a6a8ee7b8ae72384b1784b4062e95922610db8ab327d4c639ba4d41d99cfdfd96a28e31edc3f43577c8ee43e7515217c04cba46
-
Filesize
170KB
MD5e02477250ec492c18a2073305b557fd3
SHA12e306243feefa9d04c87ca6cbfb9e5e9647defbc
SHA2568670d1587ed339719b495dca78e54e812efb6ce8bf263cdac3f3096f21a6f70e
SHA512c5a1f5dd77fd6ff1dda6f1d34a6a8ee7b8ae72384b1784b4062e95922610db8ab327d4c639ba4d41d99cfdfd96a28e31edc3f43577c8ee43e7515217c04cba46
-
Filesize
170KB
MD5e02477250ec492c18a2073305b557fd3
SHA12e306243feefa9d04c87ca6cbfb9e5e9647defbc
SHA2568670d1587ed339719b495dca78e54e812efb6ce8bf263cdac3f3096f21a6f70e
SHA512c5a1f5dd77fd6ff1dda6f1d34a6a8ee7b8ae72384b1784b4062e95922610db8ab327d4c639ba4d41d99cfdfd96a28e31edc3f43577c8ee43e7515217c04cba46
-
Filesize
36KB
MD526b429976e5fdf52e5755a5515364037
SHA10621a11789b078aa33bb245eadf197e0994b7fb5
SHA25614b6653b161d1a1090e757684f6e3e8f9ffaebb90d226d863871822a19ee65db
SHA512b3c6cdc5a0a65fb398c7449599cf10ecd8e9c8827156c05ad629f4f5ea24574747b18474c549dc84c34a6ec3b9ab098f8da7e10ddde46b1ba1a5044ad6984547
-
Filesize
36KB
MD526b429976e5fdf52e5755a5515364037
SHA10621a11789b078aa33bb245eadf197e0994b7fb5
SHA25614b6653b161d1a1090e757684f6e3e8f9ffaebb90d226d863871822a19ee65db
SHA512b3c6cdc5a0a65fb398c7449599cf10ecd8e9c8827156c05ad629f4f5ea24574747b18474c549dc84c34a6ec3b9ab098f8da7e10ddde46b1ba1a5044ad6984547
-
Filesize
295KB
MD56aa2534bce88c87f81344c37c857f863
SHA15f3b3b559e1e2ae1a3947537e30c266134017f98
SHA2564c1a15de636720aece3b967ce599468eae8a67a2d3cb9e00aa308f2b9f10e74a
SHA512a7950f05cbe3a3163d1f383395e2c41c42321042df29b141c1243c31e47118362e0aea8a81ccc0f56ae14a0914f246e10ced9be193ca9f65bc90d12f9b86c33a
-
Filesize
295KB
MD56aa2534bce88c87f81344c37c857f863
SHA15f3b3b559e1e2ae1a3947537e30c266134017f98
SHA2564c1a15de636720aece3b967ce599468eae8a67a2d3cb9e00aa308f2b9f10e74a
SHA512a7950f05cbe3a3163d1f383395e2c41c42321042df29b141c1243c31e47118362e0aea8a81ccc0f56ae14a0914f246e10ced9be193ca9f65bc90d12f9b86c33a
-
Filesize
70KB
MD5492153d3b3f0fb99abd48752c8d2e796
SHA1dae87bee3d82a812cf321d933945647c4a63d854
SHA2563866bdf85958e47ab3110884035a74469fabe2495cf3cc64194d390211e312f5
SHA5123e4ee410bef252ae25a9c1065af196a41979c612478a5897c009ca25d23e9d45b091ca7787f43946aceed537a97299e97519c8bba3e79ab84205eb196c46d515
-
Filesize
70KB
MD5492153d3b3f0fb99abd48752c8d2e796
SHA1dae87bee3d82a812cf321d933945647c4a63d854
SHA2563866bdf85958e47ab3110884035a74469fabe2495cf3cc64194d390211e312f5
SHA5123e4ee410bef252ae25a9c1065af196a41979c612478a5897c009ca25d23e9d45b091ca7787f43946aceed537a97299e97519c8bba3e79ab84205eb196c46d515
-
Filesize
170KB
MD5e02477250ec492c18a2073305b557fd3
SHA12e306243feefa9d04c87ca6cbfb9e5e9647defbc
SHA2568670d1587ed339719b495dca78e54e812efb6ce8bf263cdac3f3096f21a6f70e
SHA512c5a1f5dd77fd6ff1dda6f1d34a6a8ee7b8ae72384b1784b4062e95922610db8ab327d4c639ba4d41d99cfdfd96a28e31edc3f43577c8ee43e7515217c04cba46
-
Filesize
170KB
MD5e02477250ec492c18a2073305b557fd3
SHA12e306243feefa9d04c87ca6cbfb9e5e9647defbc
SHA2568670d1587ed339719b495dca78e54e812efb6ce8bf263cdac3f3096f21a6f70e
SHA512c5a1f5dd77fd6ff1dda6f1d34a6a8ee7b8ae72384b1784b4062e95922610db8ab327d4c639ba4d41d99cfdfd96a28e31edc3f43577c8ee43e7515217c04cba46
-
Filesize
170KB
MD5e02477250ec492c18a2073305b557fd3
SHA12e306243feefa9d04c87ca6cbfb9e5e9647defbc
SHA2568670d1587ed339719b495dca78e54e812efb6ce8bf263cdac3f3096f21a6f70e
SHA512c5a1f5dd77fd6ff1dda6f1d34a6a8ee7b8ae72384b1784b4062e95922610db8ab327d4c639ba4d41d99cfdfd96a28e31edc3f43577c8ee43e7515217c04cba46
-
Filesize
170KB
MD5e02477250ec492c18a2073305b557fd3
SHA12e306243feefa9d04c87ca6cbfb9e5e9647defbc
SHA2568670d1587ed339719b495dca78e54e812efb6ce8bf263cdac3f3096f21a6f70e
SHA512c5a1f5dd77fd6ff1dda6f1d34a6a8ee7b8ae72384b1784b4062e95922610db8ab327d4c639ba4d41d99cfdfd96a28e31edc3f43577c8ee43e7515217c04cba46