Analysis
-
max time kernel
63s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe
Resource
win10v2004-20221111-en
General
-
Target
3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe
-
Size
172KB
-
MD5
4b38173517e39afebab1baf07a376469
-
SHA1
c2d67e3d521b67d301ba4a30073d9dea5429b077
-
SHA256
3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f
-
SHA512
dfdbac7e9dede48bdba05fcc2bf6074848c18fd333b7cd43ad127edc879d298d9a685fdba51f123beedd73c8ee7826a9c6ddddd6fd5e5434165472557f8449d9
-
SSDEEP
3072:kBAp5XhKpN4eOyVTGfhEClj8jTk+0hDx4jpVCTmcCu45oS48lFT0Vqtq5YyjkkrU:zbXE9OiTGfhEClq9i4EVmJ/
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1616 WScript.exe 4 1616 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\proslo\gooo\ml.txt 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe File opened for modification C:\Program Files (x86)\proslo\gooo\01.txt 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe File opened for modification C:\Program Files (x86)\proslo\gooo\zaebat.bat 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe File opened for modification C:\Program Files (x86)\proslo\gooo\onskel.vbs 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe File opened for modification C:\Program Files (x86)\proslo\gooo\oposrt0.vbs 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1320 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 28 PID 1972 wrote to memory of 1320 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 28 PID 1972 wrote to memory of 1320 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 28 PID 1972 wrote to memory of 1320 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 28 PID 1972 wrote to memory of 1616 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 30 PID 1972 wrote to memory of 1616 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 30 PID 1972 wrote to memory of 1616 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 30 PID 1972 wrote to memory of 1616 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 30 PID 1972 wrote to memory of 1684 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 31 PID 1972 wrote to memory of 1684 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 31 PID 1972 wrote to memory of 1684 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 31 PID 1972 wrote to memory of 1684 1972 3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe"C:\Users\Admin\AppData\Local\Temp\3031ee6ba5187fc441cdb27a84fdd225c16347267c5adfed219f3975034d082f.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\proslo\gooo\zaebat.bat" "2⤵
- Drops file in Drivers directory
PID:1320
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\proslo\gooo\onskel.vbs"2⤵
- Blocklisted process makes network request
PID:1616
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\proslo\gooo\oposrt0.vbs"2⤵
- Drops file in Drivers directory
PID:1684
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5B
MD55ab0ae87fb788f9e5f5b4bf4ce8280ed
SHA17549330d191a24add2dc8eec58e5765121a68674
SHA2564282b8db96951d71d70e1cb68b542c23b9ab2c82a5854738dbe7212cee761d5e
SHA51296c666bbc28e73c3567aaa0a7f803f07d407338ce80826bbc878a210b30f4b34d29d3e3c4c36cd1df6b1d4ba433e7df7bd4f0980e1344fc107985deb2216ec8c
-
Filesize
5B
MD5f2491291ff43220e3e4d3940def665d8
SHA1b764191b478e6830ba8e560551e647b08db99141
SHA25680731e509010675dd959604378ee433a8b0aca59abd86f4e9965bf4781c07abc
SHA512ffdf911995494ca174a94e75d42e6841654dcaae7c77590cb2f2bde4056cc3caeda35a29e23690dfdc5b306cafbfe0bb4d481e3572b6b3c63da8715cd82f842b
-
Filesize
458B
MD5c6402961b5e81b317ed979506709af8e
SHA1ce11f6dbff0a8e14f243ad1193b74d3be3754881
SHA2561629bf2b9a1c31bfeb8694c987812f29d048bd3629010b266a77d87e4ff45e89
SHA51225f2f57a79b551ffa6f44b99c4cac6d99fee0c3dbf1ec220bacd37138300a4d66c83ac1931908e0abec13ef5b8aa2ce0b23077f3c1e36525b0a8ae4dbb80f43d
-
Filesize
726B
MD55599cb25e711aa7856aa1b6123e683bb
SHA1866ff6b6ba77adab9cb4718c091ad03d980c6d36
SHA25636d5818d454f65abb23bff7f6eec120583225ede13535129d96ff232ef37d8dd
SHA5123e12319daa6b73427e0ff378bf5e89d78f816731a5a77ddbd54f146bbe50b18df7a7a0dd67ad53e12f3b7d1efb783ec235f00f2bb8dc7ac74abf58bb51f0019d
-
Filesize
2KB
MD5379449eab0dff37e4ae011abebff8d14
SHA1b569cebe9b7525207401c508d0651c404e45e253
SHA256016e4986f3ef7322da1fbfd070f72424799de8ccc01363282470d7caea2630d0
SHA51247c25f37ce301f3edd9ed758b496c00d846283eff7af345d0754d34760d6aa1837d2185253f05688567ec3c6014b4b7e1ff74259f5ef86eb68e72485d86c00ef
-
Filesize
1KB
MD528ee56c161c2f55d84913fa707ca38eb
SHA14d55eab718413f4edd390d79712159fdf44a2b43
SHA256e211de2bed96a92ee0c2f84da369d71e6ade062907796bcff8532bc00a1137f7
SHA5120008c2bb6e7b5cde314dfb0874e0d31fb823fab2ea67ca9c23718d0f50038762246a9f22facf9e15f376795ec172bcf312198efbf2e27cc7d8d8a99287b96240