Analysis
-
max time kernel
227s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 05:37
Behavioral task
behavioral1
Sample
b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe
Resource
win10v2004-20221111-en
General
-
Target
b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe
-
Size
8KB
-
MD5
6051d31c1d32d6acd1960bf51b4e633a
-
SHA1
5ef85f6fd154d3b20d2ec3576318b6c951d1a70f
-
SHA256
b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d
-
SHA512
4f33a32cf02e28ef9a27bbdd566a28cfa9e1dac88761074f479b32a061ac9876a6e6e22e0d161873819ec9ac568fcf163a2dc30fad49ae89a4b3a10503c752de
-
SSDEEP
192:py3AMA5zWJLFS0DoT1J6FaNJhLkwcud2DH9VwGfctlnO:pywMcSJ5Nm1waNJawcudoD7Ui
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 364 b2e.exe -
resource yara_rule behavioral1/memory/692-54-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/692-65-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 692 b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe 692 b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 692 wrote to memory of 364 692 b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe 29 PID 692 wrote to memory of 364 692 b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe 29 PID 692 wrote to memory of 364 692 b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe 29 PID 692 wrote to memory of 364 692 b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe 29 PID 364 wrote to memory of 1808 364 b2e.exe 30 PID 364 wrote to memory of 1808 364 b2e.exe 30 PID 364 wrote to memory of 1808 364 b2e.exe 30 PID 364 wrote to memory of 1808 364 b2e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe"C:\Users\Admin\AppData\Local\Temp\b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\81D.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\81D.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\81D.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\b641fd8b77d6f6e0ae9f703fda4556bdca0daf52c7092ffe4ad0eaf39dbf716d.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\907.tmp\batchfile.bat" "3⤵PID:1808
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59cf7c23271c7db723f4c77bba4b8db1f
SHA1ccb77be0006b9480e7473173098bf93fe4c6f3b9
SHA256d534b9ddc3d83ce1be80d941cc18aada3353b06c300cf96707b2f8f13276f45c
SHA5122236c5b93e03f11e14399e3cc335a5c53ac6a33ffcd1ae873c5be49390fb3d51fb1f44abdacaedfff5b07e745f607718fcc2ba84d34ef7e403abcda651758ddb
-
Filesize
8KB
MD59cf7c23271c7db723f4c77bba4b8db1f
SHA1ccb77be0006b9480e7473173098bf93fe4c6f3b9
SHA256d534b9ddc3d83ce1be80d941cc18aada3353b06c300cf96707b2f8f13276f45c
SHA5122236c5b93e03f11e14399e3cc335a5c53ac6a33ffcd1ae873c5be49390fb3d51fb1f44abdacaedfff5b07e745f607718fcc2ba84d34ef7e403abcda651758ddb
-
Filesize
27B
MD5a47e838e947071be3e212f4a857dcb49
SHA1cfcbd49ca779dc2a30143eb4590b77b6e93be438
SHA256763b9203b053cd451976129330d1f9fd8582337f021ceb153b54e3d2d9d220fc
SHA512b1b121a5a70be58b5c96b809286e6578c3ee8b913b07be1d245289303b1f6fdda38768ea031eea7e908cf7d0504cfeff1663d9077d30e4b7cb64524f1cb1ca4c
-
Filesize
8KB
MD59cf7c23271c7db723f4c77bba4b8db1f
SHA1ccb77be0006b9480e7473173098bf93fe4c6f3b9
SHA256d534b9ddc3d83ce1be80d941cc18aada3353b06c300cf96707b2f8f13276f45c
SHA5122236c5b93e03f11e14399e3cc335a5c53ac6a33ffcd1ae873c5be49390fb3d51fb1f44abdacaedfff5b07e745f607718fcc2ba84d34ef7e403abcda651758ddb
-
Filesize
8KB
MD59cf7c23271c7db723f4c77bba4b8db1f
SHA1ccb77be0006b9480e7473173098bf93fe4c6f3b9
SHA256d534b9ddc3d83ce1be80d941cc18aada3353b06c300cf96707b2f8f13276f45c
SHA5122236c5b93e03f11e14399e3cc335a5c53ac6a33ffcd1ae873c5be49390fb3d51fb1f44abdacaedfff5b07e745f607718fcc2ba84d34ef7e403abcda651758ddb