Analysis
-
max time kernel
82s -
max time network
109s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe
Resource
win10v2004-20220812-en
General
-
Target
84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe
-
Size
180KB
-
MD5
45a62912ced6f24ee33d9d080f557c90
-
SHA1
0dc8ade2ef5260684146656eb8015c1030ffb87e
-
SHA256
84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e
-
SHA512
975fe4efd3e157faf03b03c864c42b0087b78a9150d966d2bd61d55be91c2c3da53e9f503a117abb4aa0cebebc7ad00fac0c946100167c5fa55aaddd7900229b
-
SSDEEP
3072:eBAp5XhKpN4eOyVTGfhEClj8jTk+0hJZYCZqOuCYM:1bXE9OiTGfhEClq9UVZqOf9
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 4 1512 WScript.exe 5 1512 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\The first evidence\Guatemala is a magical\ee\she.he 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe File opened for modification C:\Program Files (x86)\The first evidence\Guatemala is a magical\08a4415e9d594ff960030b921d42b91e.bat 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe File opened for modification C:\Program Files (x86)\The first evidence\Guatemala is a magical\ee\63c4da4fde984fa5c719cdcf2147ab7f.vbs 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe File opened for modification C:\Program Files (x86)\The first evidence\Guatemala is a magical\ee\87dba6b5e5e739d7a8506bbceb19e4be.vbs 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 904 wrote to memory of 2000 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 28 PID 904 wrote to memory of 2000 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 28 PID 904 wrote to memory of 2000 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 28 PID 904 wrote to memory of 2000 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 28 PID 904 wrote to memory of 1512 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 30 PID 904 wrote to memory of 1512 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 30 PID 904 wrote to memory of 1512 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 30 PID 904 wrote to memory of 1512 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 30 PID 904 wrote to memory of 1320 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 31 PID 904 wrote to memory of 1320 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 31 PID 904 wrote to memory of 1320 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 31 PID 904 wrote to memory of 1320 904 84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe"C:\Users\Admin\AppData\Local\Temp\84b9b2255202d180c0077c7662f51a198a97af84811a2fa8b2aef8aa771c575e.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\The first evidence\Guatemala is a magical\08a4415e9d594ff960030b921d42b91e.bat" "2⤵
- Drops file in Drivers directory
PID:2000
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\The first evidence\Guatemala is a magical\ee\63c4da4fde984fa5c719cdcf2147ab7f.vbs"2⤵
- Blocklisted process makes network request
PID:1512
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\The first evidence\Guatemala is a magical\ee\87dba6b5e5e739d7a8506bbceb19e4be.vbs"2⤵
- Drops file in Drivers directory
PID:1320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\The first evidence\Guatemala is a magical\08a4415e9d594ff960030b921d42b91e.bat
Filesize2KB
MD5a68c363b2beb97e2197852cb09e4a222
SHA120360ed8e0ab2bef6d51e083aba49c057302df3d
SHA256c3557736313a6564ddc3374987a58bb78aad86c22c210c291b93caa344a191da
SHA512baa329b7b7c18411f75b1c8a8656481186fb757634209b0c2a35eb0ba9a8d67f4a5807e13c46415a97f81ffe362e42fc8957cc1d7a8a4edd87de1a1592828c44
-
C:\Program Files (x86)\The first evidence\Guatemala is a magical\ee\63c4da4fde984fa5c719cdcf2147ab7f.vbs
Filesize448B
MD5c92a6f77ded8c80942dcc8adff187367
SHA171e79502f802219eda515919ac8aea2b44c3e5e5
SHA256be64837788cb94db8b512219a7c740eaa7d09384d0712f8729e5e42a0ef2def6
SHA5121883615d49fc49aae67467cb5591c562da47813a19f33f5ac567bd4759a3f7271cbc26413310fb30df025f4b656ecae8764ad8fdfe7574b1c55bcecb26e32a74
-
C:\Program Files (x86)\The first evidence\Guatemala is a magical\ee\87dba6b5e5e739d7a8506bbceb19e4be.vbs
Filesize505B
MD568cbcae0f1a323300f0ff8c04a69f46a
SHA114af6502d1464b8c9ec2496f92a67ef4f43c65d3
SHA256251b2e53bc3e4932443859f77c1ebe720675b39883a50f918261decfb86e39d3
SHA5127147d655308dbc69f6e28fac928ced8918da3c43c53264e8ad5b03c497ace9e3ae4843894c7b33671371d6ba27bd1f6731e4dbd72e4393bfd5f215c4ed0ad98e
-
Filesize
104B
MD5160ab57966ebac43a0f8e547c83b07af
SHA1bf6967319e5f2ae957996cb03971a6d52b86db9a
SHA256db168763d6b1426947758fb2949fd16f8eeea229e910b2cae07ea18ebd1dcd8f
SHA512564647148ec09249b40e1507ee737f6e2797637feb32cf0d5fcaec96113952e52c49ee5b7b215dc7434f1148e58dc0ff6edf51c6a0d46754877ff813c6debe43
-
Filesize
1KB
MD59ae1ee9e515c1a3066506a2473887920
SHA1b831426aa90ec1cbf53011c0d23f6e30969625f4
SHA256febbfa05decdf915581d09e096dd79c561888b01c3e3d0933f8493344712cd2a
SHA512a8bcb015deac34fa8a2e14e00f94ff6248dd9058d70e63eddf25ae1cb6455a450f3bef603722585fdaf7f9c9a9d8b61d2c0265c296538e45a6fe95d28c4397ae