Analysis
-
max time kernel
69s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe
Resource
win10v2004-20220812-en
General
-
Target
1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe
-
Size
116KB
-
MD5
4e8dee02eb91d7d709d02689b66b1e96
-
SHA1
e8cb8721ee536f96ac43461240829bcb3f3ebd6e
-
SHA256
1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b
-
SHA512
393b91980a8e212a1049d0b1eb0ac5da43923c198e475414e5ee1341fa5f21a348f035eb1375cb1222acebfbc99ca73e72e42aee1d38136b788dd3cb11a4f02c
-
SSDEEP
3072:ABAp5XhKpN4eOyVTGfhEClj8jTk+0h4iu:3bXE9OiTGfhEClq9Gu
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1208 WScript.exe 5 1208 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\To\Zi\parlament.vbs 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe File opened for modification C:\Program Files (x86)\To\Zi\vismut.vbs 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe File opened for modification C:\Program Files (x86)\To\Zi\ziiil.sa 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe File opened for modification C:\Program Files (x86)\To\Zi\mwerfwerwre.dff 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe File opened for modification C:\Program Files (x86)\To\Zi\chisti_kaif.bat 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 968 wrote to memory of 1436 968 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe 28 PID 968 wrote to memory of 1436 968 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe 28 PID 968 wrote to memory of 1436 968 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe 28 PID 968 wrote to memory of 1436 968 1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe 28 PID 1436 wrote to memory of 1720 1436 cmd.exe 30 PID 1436 wrote to memory of 1720 1436 cmd.exe 30 PID 1436 wrote to memory of 1720 1436 cmd.exe 30 PID 1436 wrote to memory of 1720 1436 cmd.exe 30 PID 1436 wrote to memory of 1208 1436 cmd.exe 31 PID 1436 wrote to memory of 1208 1436 cmd.exe 31 PID 1436 wrote to memory of 1208 1436 cmd.exe 31 PID 1436 wrote to memory of 1208 1436 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe"C:\Users\Admin\AppData\Local\Temp\1048c1cd122ad949a3803552076e3712354b006c659daa8fea93315d964edd4b.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\To\Zi\chisti_kaif.bat" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\To\Zi\parlament.vbs"3⤵
- Drops file in Drivers directory
PID:1720
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\To\Zi\vismut.vbs"3⤵
- Blocklisted process makes network request
PID:1208
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5621d365266daa1e252d0a130aac7646c
SHA184a4af748a715327c53525568d0992ccabed445d
SHA2566a77aa99f2e940ea68fa6422eacbab261a552b6f42d8011a2c9d1081c907c0f9
SHA5125f6d0554781b53ab6f380e75f4da36054990fbbccbb163ae74a872f124fdd49248d73ff4e9cd9ff9057d70b95d5b348c940fc1ff7bda350a7c296b6bc6da46b9
-
Filesize
38B
MD5dff33e9ecbfc92e8e37944b4fa307a8e
SHA1e3e57a13351c647b225047e2e85389833425bc46
SHA2568fb1fc7636f2f467e70828219482562264fddbc7af34419c8b2f15fd365a9656
SHA51231c5917d1e2db98dbc5de98cd92d883fe233f160a572bd4dc33b64f305e6d8e5e4d97178cd5a17e477a1737cc3413ba9ef448869b2413e2d295530d486541ba3
-
Filesize
1KB
MD5f623df94aa20426810e3962075a6b460
SHA19f7be280479da3a9f4c91e9f19ae4cef84e5270e
SHA2569d570d35966f12947bf647c831f741f8e4cec2f7b69b366726a4846b079c82ab
SHA512acc86c367e7d849eac1018db1522ce03756097a5326164ab697f786d31ef6c144a4f8dedc70d68a17ed8074828ebf029484059a9f7400d86bb1747b5cddd899a
-
Filesize
292B
MD5b7fbca74e486d11cdc244d5a0566a1aa
SHA1acd2435f6567bc56a5ba04ded97b828d5bf6c53d
SHA256fa941a1005d1df515e7a32d4e878b1e49f6d715d1d393676553a0b4cfd05ceaf
SHA51202b9f4f4537be1654701a0feb25ee343132fa8716a3f0b0aa3ee88f34d3a18c72b7a957fceb03b5904599ab512d6ff58427ec6427cf8291040d15dbf0d123fe0
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
1KB
MD53bf1b84104026abc9f118195cba2fd11
SHA106b4520880368dcf95e20dd2c20816a0989699bd
SHA256792464bd0224cde5a3bde2f2ccf7f11cef05a17b01f9a3df2fd0257e98b958f7
SHA5129f1f4a13828ce6ada9036500160402329ad53a36db3b93c9416d88bde127f3cfe4f07587f4b0573d1dd822d810ab1e284b52e897c4eab0baf5ae14d79e3e27c9