Analysis
-
max time kernel
31s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 16:51
Static task
static1
Behavioral task
behavioral1
Sample
8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe
Resource
win10v2004-20221111-en
General
-
Target
8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe
-
Size
38KB
-
MD5
b1bf72c9c9bfc9b16f0bba3135de8377
-
SHA1
a83c333d22d3e440a4a57cc03ea1318c35573853
-
SHA256
8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272
-
SHA512
b4062697d47415b7475f2c756b1671a14b4945621202311b97a782aea1f2acb5fa900ce37940ac7aa8d038a9bcbc633e9bcc2bb2a8838b1422377e3cd43a8584
-
SSDEEP
768:9VO48tURyrl6iaLcuR+G7UxFEtTJFFXC3CKegOP:O4QUIrl3a5RCxOHFy3dC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 972 decrypted.exe -
Loads dropped DLL 5 IoCs
pid Process 1900 8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe 1900 8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe 1384 WerFault.exe 1384 WerFault.exe 1384 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1384 972 WerFault.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1900 8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1900 wrote to memory of 972 1900 8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe 28 PID 1900 wrote to memory of 972 1900 8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe 28 PID 1900 wrote to memory of 972 1900 8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe 28 PID 1900 wrote to memory of 972 1900 8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe 28 PID 972 wrote to memory of 1384 972 decrypted.exe 29 PID 972 wrote to memory of 1384 972 decrypted.exe 29 PID 972 wrote to memory of 1384 972 decrypted.exe 29 PID 972 wrote to memory of 1384 972 decrypted.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe"C:\Users\Admin\AppData\Local\Temp\8c14c0bca0e2096bd8d5b25669043c05bcc32c414c944358460c779cd7b5d272.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\decrypted.exe"C:\Users\Admin\AppData\Local\Temp\decrypted.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 363⤵
- Loads dropped DLL
- Program crash
PID:1384
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5b6c14514b988e297c03f0019dd120f5c
SHA1de0e8a847866e5bd33bfe18df1a5de6668c624d0
SHA256ef572c4809c415f36959f1b7435bb665b7eca83d6dd42450ddbc1c78bc205a77
SHA512bafbffdac3523e52f5ee079a85800c1bcec10a9d2559ff1517a87835bede61c1950814d7df442e6da698d35adaa36f5ce1c1e7a15264d3238d254649193582d5
-
Filesize
18KB
MD5b6c14514b988e297c03f0019dd120f5c
SHA1de0e8a847866e5bd33bfe18df1a5de6668c624d0
SHA256ef572c4809c415f36959f1b7435bb665b7eca83d6dd42450ddbc1c78bc205a77
SHA512bafbffdac3523e52f5ee079a85800c1bcec10a9d2559ff1517a87835bede61c1950814d7df442e6da698d35adaa36f5ce1c1e7a15264d3238d254649193582d5
-
Filesize
18KB
MD5b6c14514b988e297c03f0019dd120f5c
SHA1de0e8a847866e5bd33bfe18df1a5de6668c624d0
SHA256ef572c4809c415f36959f1b7435bb665b7eca83d6dd42450ddbc1c78bc205a77
SHA512bafbffdac3523e52f5ee079a85800c1bcec10a9d2559ff1517a87835bede61c1950814d7df442e6da698d35adaa36f5ce1c1e7a15264d3238d254649193582d5
-
Filesize
18KB
MD5b6c14514b988e297c03f0019dd120f5c
SHA1de0e8a847866e5bd33bfe18df1a5de6668c624d0
SHA256ef572c4809c415f36959f1b7435bb665b7eca83d6dd42450ddbc1c78bc205a77
SHA512bafbffdac3523e52f5ee079a85800c1bcec10a9d2559ff1517a87835bede61c1950814d7df442e6da698d35adaa36f5ce1c1e7a15264d3238d254649193582d5
-
Filesize
18KB
MD5b6c14514b988e297c03f0019dd120f5c
SHA1de0e8a847866e5bd33bfe18df1a5de6668c624d0
SHA256ef572c4809c415f36959f1b7435bb665b7eca83d6dd42450ddbc1c78bc205a77
SHA512bafbffdac3523e52f5ee079a85800c1bcec10a9d2559ff1517a87835bede61c1950814d7df442e6da698d35adaa36f5ce1c1e7a15264d3238d254649193582d5
-
Filesize
18KB
MD5b6c14514b988e297c03f0019dd120f5c
SHA1de0e8a847866e5bd33bfe18df1a5de6668c624d0
SHA256ef572c4809c415f36959f1b7435bb665b7eca83d6dd42450ddbc1c78bc205a77
SHA512bafbffdac3523e52f5ee079a85800c1bcec10a9d2559ff1517a87835bede61c1950814d7df442e6da698d35adaa36f5ce1c1e7a15264d3238d254649193582d5
-
Filesize
18KB
MD5b6c14514b988e297c03f0019dd120f5c
SHA1de0e8a847866e5bd33bfe18df1a5de6668c624d0
SHA256ef572c4809c415f36959f1b7435bb665b7eca83d6dd42450ddbc1c78bc205a77
SHA512bafbffdac3523e52f5ee079a85800c1bcec10a9d2559ff1517a87835bede61c1950814d7df442e6da698d35adaa36f5ce1c1e7a15264d3238d254649193582d5