Analysis
-
max time kernel
4s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 07:46
Static task
static1
Behavioral task
behavioral1
Sample
d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe
Resource
win10v2004-20221111-en
General
-
Target
d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe
-
Size
146KB
-
MD5
a752ace9308f6f7b20c72cfd96f21358
-
SHA1
847a15885f15d981ab9a8c29aa3f8e73418b2282
-
SHA256
d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f
-
SHA512
b8806cb36780b39d7806eb40bb8914f8070bbf49f9cb302c34fd6bd6a15aebadd84da7065dbfb17536d6c760962e195db3f40d781606940129d0dc55129d75c9
-
SSDEEP
3072:XmZtLUK5BRyxxfJSihe7Mer29AkHCzkP0lB:XmZtn5OXfLG8A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 532 ExpressVids.exe -
Loads dropped DLL 10 IoCs
pid Process 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 532 ExpressVids.exe 532 ExpressVids.exe 532 ExpressVids.exe 1080 WerFault.exe 1080 WerFault.exe 1080 WerFault.exe 1080 WerFault.exe 1080 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1080 532 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1760 wrote to memory of 532 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 28 PID 1760 wrote to memory of 532 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 28 PID 1760 wrote to memory of 532 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 28 PID 1760 wrote to memory of 532 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 28 PID 1760 wrote to memory of 532 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 28 PID 1760 wrote to memory of 532 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 28 PID 1760 wrote to memory of 532 1760 d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe 28 PID 532 wrote to memory of 1080 532 ExpressVids.exe 29 PID 532 wrote to memory of 1080 532 ExpressVids.exe 29 PID 532 wrote to memory of 1080 532 ExpressVids.exe 29 PID 532 wrote to memory of 1080 532 ExpressVids.exe 29 PID 532 wrote to memory of 1080 532 ExpressVids.exe 29 PID 532 wrote to memory of 1080 532 ExpressVids.exe 29 PID 532 wrote to memory of 1080 532 ExpressVids.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe"C:\Users\Admin\AppData\Local\Temp\d7c3c6eeac20962183eafd8795cfdf4c2a1fb02143b4ca4b8570e03736ebb21f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\ExpressVids.exeC:\Users\Admin\AppData\Local\Temp\ExpressVids.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 2843⤵
- Loads dropped DLL
- Program crash
PID:1080
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63
-
Filesize
85KB
MD5c13ff33c89e93539e868d7dcb2e2c1f6
SHA1fe66ded2856ab4ffe233fddd8c835eb6ef3755f7
SHA256c12303594943d73f1c0e02ab6ef34e65a158ffc26b0db23d7664cd541180ef1c
SHA51215fcff9d68ad47dd2236f0a75fcc4fed1270fe76bc81eaf64298e415c154f7c4eb470361f24edc268ece3d5eeb8dc67c278485265aab50e87d2e253f0871ce63