Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe
Resource
win10v2004-20220812-en
General
-
Target
7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe
-
Size
24.4MB
-
MD5
144c5cd8101ef0444e54b254882f8f4d
-
SHA1
a9921bcb46394f81cf4c3b424c0166930876af12
-
SHA256
7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b
-
SHA512
965c59061bb6b838939faceaac8a9ae1fecf5cea30b2a2d6af568dac1537ed191abb6da2d2de70d08cf3d97607c2b1a816bedab02e201b2718e3705f1d6243d0
-
SSDEEP
98304:ZMRqzs/LNPP9Xil+4JAv8clSVvf9M6a1lT5l4dIHh6QfW3D:S0zszdpObivXwt+64mdIbWT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 976 rjyzdssetup.exe -
Loads dropped DLL 5 IoCs
pid Process 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 976 rjyzdssetup.exe 976 rjyzdssetup.exe 976 rjyzdssetup.exe 976 rjyzdssetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rjyzdssetup = "C:\\Users\\Public\\Tlsiy\\Ifgm.exe /rjyzdssetup /{FA4E51E9-28EE-4B39-A241-0BBDE3B98B89}" 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 12 IoCs
resource yara_rule behavioral1/files/0x000900000001267a-59.dat nsis_installer_1 behavioral1/files/0x000900000001267a-59.dat nsis_installer_2 behavioral1/files/0x000900000001267a-61.dat nsis_installer_1 behavioral1/files/0x000900000001267a-61.dat nsis_installer_2 behavioral1/files/0x000900000001267a-64.dat nsis_installer_1 behavioral1/files/0x000900000001267a-64.dat nsis_installer_2 behavioral1/files/0x000900000001267a-63.dat nsis_installer_1 behavioral1/files/0x000900000001267a-63.dat nsis_installer_2 behavioral1/files/0x000900000001267a-66.dat nsis_installer_1 behavioral1/files/0x000900000001267a-66.dat nsis_installer_2 behavioral1/files/0x000900000001267a-65.dat nsis_installer_1 behavioral1/files/0x000900000001267a-65.dat nsis_installer_2 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 288 wrote to memory of 876 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 28 PID 288 wrote to memory of 876 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 28 PID 288 wrote to memory of 876 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 28 PID 288 wrote to memory of 876 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 28 PID 288 wrote to memory of 876 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 28 PID 288 wrote to memory of 876 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 28 PID 288 wrote to memory of 876 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 28 PID 876 wrote to memory of 784 876 Net.exe 30 PID 876 wrote to memory of 784 876 Net.exe 30 PID 876 wrote to memory of 784 876 Net.exe 30 PID 876 wrote to memory of 784 876 Net.exe 30 PID 876 wrote to memory of 784 876 Net.exe 30 PID 876 wrote to memory of 784 876 Net.exe 30 PID 876 wrote to memory of 784 876 Net.exe 30 PID 288 wrote to memory of 976 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 31 PID 288 wrote to memory of 976 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 31 PID 288 wrote to memory of 976 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 31 PID 288 wrote to memory of 976 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 31 PID 288 wrote to memory of 976 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 31 PID 288 wrote to memory of 976 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 31 PID 288 wrote to memory of 976 288 7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe"C:\Users\Admin\AppData\Local\Temp\7b893431eb68c5d126cfdc3d16563a90f84c2572f83b7bb06e785508a28a0b5b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\Net.exeNet Stop PcaSvc2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 Stop PcaSvc3⤵PID:784
-
-
-
C:\Users\Admin\AppData\Local\Temp\g8E85D\rjyzdssetup.exeC:\Users\Admin\AppData\Local\Temp\g8E85D\rjyzdssetup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD549d2e7d1e9303b29834de271723a74c6
SHA1caec16e970adf27b1dffab2d1b154567967dd288
SHA256063393a914c407782325c85ae4a0c2cdf320802b561fa7f524bb85625251121f
SHA512a93ea613aad63259321b098bc91b3735b04379ae039e7eae77e95b8ac7090f43e1934554b1912edf3dacabdfb7892de71d4c05b53bd33cd655025e51e592cc90
-
Filesize
2.5MB
MD549d2e7d1e9303b29834de271723a74c6
SHA1caec16e970adf27b1dffab2d1b154567967dd288
SHA256063393a914c407782325c85ae4a0c2cdf320802b561fa7f524bb85625251121f
SHA512a93ea613aad63259321b098bc91b3735b04379ae039e7eae77e95b8ac7090f43e1934554b1912edf3dacabdfb7892de71d4c05b53bd33cd655025e51e592cc90
-
Filesize
2.5MB
MD549d2e7d1e9303b29834de271723a74c6
SHA1caec16e970adf27b1dffab2d1b154567967dd288
SHA256063393a914c407782325c85ae4a0c2cdf320802b561fa7f524bb85625251121f
SHA512a93ea613aad63259321b098bc91b3735b04379ae039e7eae77e95b8ac7090f43e1934554b1912edf3dacabdfb7892de71d4c05b53bd33cd655025e51e592cc90
-
Filesize
2.5MB
MD549d2e7d1e9303b29834de271723a74c6
SHA1caec16e970adf27b1dffab2d1b154567967dd288
SHA256063393a914c407782325c85ae4a0c2cdf320802b561fa7f524bb85625251121f
SHA512a93ea613aad63259321b098bc91b3735b04379ae039e7eae77e95b8ac7090f43e1934554b1912edf3dacabdfb7892de71d4c05b53bd33cd655025e51e592cc90
-
Filesize
2.5MB
MD549d2e7d1e9303b29834de271723a74c6
SHA1caec16e970adf27b1dffab2d1b154567967dd288
SHA256063393a914c407782325c85ae4a0c2cdf320802b561fa7f524bb85625251121f
SHA512a93ea613aad63259321b098bc91b3735b04379ae039e7eae77e95b8ac7090f43e1934554b1912edf3dacabdfb7892de71d4c05b53bd33cd655025e51e592cc90
-
Filesize
2.5MB
MD549d2e7d1e9303b29834de271723a74c6
SHA1caec16e970adf27b1dffab2d1b154567967dd288
SHA256063393a914c407782325c85ae4a0c2cdf320802b561fa7f524bb85625251121f
SHA512a93ea613aad63259321b098bc91b3735b04379ae039e7eae77e95b8ac7090f43e1934554b1912edf3dacabdfb7892de71d4c05b53bd33cd655025e51e592cc90
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0