Analysis
-
max time kernel
39s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
WEB1DO~1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
WEB1DO~1.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
setup.exe
Resource
win10v2004-20221111-en
General
-
Target
setup.exe
-
Size
858KB
-
MD5
8a166942be43113446aaaf849ed936ce
-
SHA1
96aef6514d29f961b5952c25dfa2edd0878014cf
-
SHA256
8d4bc9ab5421e83ee60873f0aecbd307bc2e22cabff8e8a6bdf7ab9e2e20f5b5
-
SHA512
1c291a2792ec7e2a843907dc8074eda018560e51103b2e764b761d6eaea997c61ac41d2e83edd57327618683603bafb84a5052a43b16689cd734c070da7b09bd
-
SSDEEP
12288:Z2UBGPFJag4vH5QJ2MITDnl+7trXz9PKkoQOd43yOlYxIOxRzgPDh+WNNynWD6Yy:Z2UEPFJag8dfvnKdKkJhllqIPsOMM6r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1892 setup.tmp -
Loads dropped DLL 3 IoCs
pid Process 1280 setup.exe 1892 setup.tmp 1892 setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1892 1280 setup.exe 28 PID 1280 wrote to memory of 1892 1280 setup.exe 28 PID 1280 wrote to memory of 1892 1280 setup.exe 28 PID 1280 wrote to memory of 1892 1280 setup.exe 28 PID 1280 wrote to memory of 1892 1280 setup.exe 28 PID 1280 wrote to memory of 1892 1280 setup.exe 28 PID 1280 wrote to memory of 1892 1280 setup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\is-V4EIJ.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-V4EIJ.tmp\setup.tmp" /SL5="$60124,609633,53248,C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665KB
MD59e30ab5e3f6b43f69f928e6b4fcfd604
SHA1b110f04114c52f2439715cbad3769250dbcdb1b3
SHA256affbe7f0320f9602d8c51468ecb7bc7960df4f62ab1a36c05ac2fe2816d175ba
SHA5128d751d8c8023bbd54ea2ea0969ad9f379d8bf1066980fdd58007e778bdf654e4e13264ac8917be91ac8583ea9ae5536ca600530f413cbd887c234ec60be5a45d
-
Filesize
665KB
MD59e30ab5e3f6b43f69f928e6b4fcfd604
SHA1b110f04114c52f2439715cbad3769250dbcdb1b3
SHA256affbe7f0320f9602d8c51468ecb7bc7960df4f62ab1a36c05ac2fe2816d175ba
SHA5128d751d8c8023bbd54ea2ea0969ad9f379d8bf1066980fdd58007e778bdf654e4e13264ac8917be91ac8583ea9ae5536ca600530f413cbd887c234ec60be5a45d
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
665KB
MD59e30ab5e3f6b43f69f928e6b4fcfd604
SHA1b110f04114c52f2439715cbad3769250dbcdb1b3
SHA256affbe7f0320f9602d8c51468ecb7bc7960df4f62ab1a36c05ac2fe2816d175ba
SHA5128d751d8c8023bbd54ea2ea0969ad9f379d8bf1066980fdd58007e778bdf654e4e13264ac8917be91ac8583ea9ae5536ca600530f413cbd887c234ec60be5a45d