Analysis
-
max time kernel
104s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 22:40
Static task
static1
Behavioral task
behavioral1
Sample
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe
Resource
win7-20220901-en
General
-
Target
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe
-
Size
1.3MB
-
MD5
74079c12b9f2aac6e8c6589d02a61bae
-
SHA1
f3ee1c95814a8bb9f4924219820e84c8b63928b1
-
SHA256
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d
-
SHA512
90a11fd92bab604b2d86a7b0b84b15dc60b68fc8979434930e86e3e7f57eea436ae21f5685ddf8ba9f3f3847ec397340015f32de314f7993e39dcd9b0a7d9e9c
-
SSDEEP
24576:ZmMuVE/AnaKAHh6akEKtkZf/UUsdAIAtJmzbN9RpMm/fi+oaWuBX/5:ZmMuGJ6nEKqJJxIoJmt97tfi+oa5Bv5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exepid process 1788 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 728 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exepid process 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exeXigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exepid process 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe 1788 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1788 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1788 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1788 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe 1788 Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.execmd.exedescription pid process target process PID 1444 wrote to memory of 1636 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe schtasks.exe PID 1444 wrote to memory of 1636 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe schtasks.exe PID 1444 wrote to memory of 1636 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe schtasks.exe PID 1444 wrote to memory of 1636 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe schtasks.exe PID 1444 wrote to memory of 1788 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe PID 1444 wrote to memory of 1788 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe PID 1444 wrote to memory of 1788 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe PID 1444 wrote to memory of 1788 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe PID 1444 wrote to memory of 728 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe cmd.exe PID 1444 wrote to memory of 728 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe cmd.exe PID 1444 wrote to memory of 728 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe cmd.exe PID 1444 wrote to memory of 728 1444 7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe cmd.exe PID 728 wrote to memory of 1144 728 cmd.exe chcp.com PID 728 wrote to memory of 1144 728 cmd.exe chcp.com PID 728 wrote to memory of 1144 728 cmd.exe chcp.com PID 728 wrote to memory of 1144 728 cmd.exe chcp.com PID 728 wrote to memory of 1512 728 cmd.exe PING.EXE PID 728 wrote to memory of 1512 728 cmd.exe PING.EXE PID 728 wrote to memory of 1512 728 cmd.exe PING.EXE PID 728 wrote to memory of 1512 728 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe"C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /tn COMSurrogate /f /sc onlogon /rl highest /tr "C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe"2⤵
- Creates scheduled task(s)
PID:1636 -
C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe"C:\Users\Admin\Vika\Xigir soveh kipanal rabapa xaqu nahiniy vakexo gav.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\7b6637b2e136f7d7faa5d8a860e7849896ce548a6681840df2adacb23808782d.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1512 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1144
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
801.3MB
MD58e40607b645e9838734ff555422caeb3
SHA1b925fc0eb10a42c54caefaf23f87621bc4bfcdc5
SHA2569583fd655824e2b5d89bfa35e2c239a4d080347b93a1adced5fe4a3f698401c4
SHA512bb288f5b5c53ee18c5374c760a0118bba9d5dec20467ac8c9996c8a72eadb2eb99766247ce1f52dd1507febd9c5c448692bc09564d76d88b701215bf037a2661
-
Filesize
801.3MB
MD58e40607b645e9838734ff555422caeb3
SHA1b925fc0eb10a42c54caefaf23f87621bc4bfcdc5
SHA2569583fd655824e2b5d89bfa35e2c239a4d080347b93a1adced5fe4a3f698401c4
SHA512bb288f5b5c53ee18c5374c760a0118bba9d5dec20467ac8c9996c8a72eadb2eb99766247ce1f52dd1507febd9c5c448692bc09564d76d88b701215bf037a2661