Analysis
-
max time kernel
149s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe
Resource
win10v2004-20220901-en
General
-
Target
e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe
-
Size
443KB
-
MD5
a82385182fc4021d2c6a9535b27ce28b
-
SHA1
b5b753b65bf54439a72fce016ab0bb48e81a53a8
-
SHA256
e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16
-
SHA512
ec1f636b9590f0c7ab6065e9177dcc23095b4d2eb34b0e5fcd2d6c8a16edb44cf6e2b95123dfcf5f3ea08bbdce192008d79c3262b390c0c5cae5cb7eefa1f13b
-
SSDEEP
6144:5ZunObR8sVImcyYC5JZz3jzB8kOQIq+3mxkyJIrC+J/pbKvCB23xqy7uXhY7pOKy:WK+mzJ/6Y+4hupHQYyqXh6ZyDlQ3KMC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1360 loadwg.exe 1160 chdwg.exe -
resource yara_rule behavioral1/files/0x000a000000013300-55.dat upx behavioral1/files/0x000a000000013300-56.dat upx behavioral1/files/0x000a000000013300-58.dat upx behavioral1/files/0x000a000000013300-60.dat upx behavioral1/memory/1360-62-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral1/memory/1360-63-0x0000000000400000-0x00000000004AC000-memory.dmp upx -
Loads dropped DLL 7 IoCs
pid Process 1012 e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe 1012 e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe 1360 loadwg.exe 1360 loadwg.exe 1160 chdwg.exe 1360 loadwg.exe 1012 e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1360-62-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral1/memory/1360-63-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\inf\xxy.dll chdwg.exe File opened for modification C:\Windows\inf\aidx.ini chdwg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1360 loadwg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 loadwg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1160 chdwg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1012 wrote to memory of 1360 1012 e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe 28 PID 1012 wrote to memory of 1360 1012 e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe 28 PID 1012 wrote to memory of 1360 1012 e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe 28 PID 1012 wrote to memory of 1360 1012 e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe 28 PID 1360 wrote to memory of 1160 1360 loadwg.exe 32 PID 1360 wrote to memory of 1160 1360 loadwg.exe 32 PID 1360 wrote to memory of 1160 1360 loadwg.exe 32 PID 1360 wrote to memory of 1160 1360 loadwg.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe"C:\Users\Admin\AppData\Local\Temp\e50862a292da9307415b3457f0fb79b1929da9999ec0c267c726c99140f30d16.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\chdwg.exechdwg.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1160
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5929e8e48a71ce23df251af2b8253f23f
SHA173992e5ddbf545b49adb686726d3226f6013c4ce
SHA2565edbfc81e21a29786fac719b8c4f2e62a0505971b2e16440b5d02a9804d08d66
SHA512ce49412b5d700cc231ad655dd6a605216f6d5f6f5f1c5f43f1c9f29b2ffd872fd2bb7b4956359d75be44bfbaedd7353d8f3ccf5852662c215884dbf5936edd48
-
Filesize
15KB
MD5929e8e48a71ce23df251af2b8253f23f
SHA173992e5ddbf545b49adb686726d3226f6013c4ce
SHA2565edbfc81e21a29786fac719b8c4f2e62a0505971b2e16440b5d02a9804d08d66
SHA512ce49412b5d700cc231ad655dd6a605216f6d5f6f5f1c5f43f1c9f29b2ffd872fd2bb7b4956359d75be44bfbaedd7353d8f3ccf5852662c215884dbf5936edd48
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e
-
Filesize
23KB
MD5b42620f56d958611152358b3e0092df3
SHA1a185f6e21ad591715f5d2a061a82e9e3400e6a14
SHA256c91453f20030eaf2811cd3ae5bbcd8cf8f5e0da111cd61148d68781e1f63472c
SHA512dc4b210bf66a5b28d2638e7a6d5f9ec1faebc37bcc22542f7313e16547e7633cf6488e574ea33beabe6513f4c070ed90ccdb97cce8de61e5e803fe1496b0d7ba
-
Filesize
15KB
MD5929e8e48a71ce23df251af2b8253f23f
SHA173992e5ddbf545b49adb686726d3226f6013c4ce
SHA2565edbfc81e21a29786fac719b8c4f2e62a0505971b2e16440b5d02a9804d08d66
SHA512ce49412b5d700cc231ad655dd6a605216f6d5f6f5f1c5f43f1c9f29b2ffd872fd2bb7b4956359d75be44bfbaedd7353d8f3ccf5852662c215884dbf5936edd48
-
Filesize
15KB
MD5929e8e48a71ce23df251af2b8253f23f
SHA173992e5ddbf545b49adb686726d3226f6013c4ce
SHA2565edbfc81e21a29786fac719b8c4f2e62a0505971b2e16440b5d02a9804d08d66
SHA512ce49412b5d700cc231ad655dd6a605216f6d5f6f5f1c5f43f1c9f29b2ffd872fd2bb7b4956359d75be44bfbaedd7353d8f3ccf5852662c215884dbf5936edd48
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e
-
Filesize
23KB
MD5b42620f56d958611152358b3e0092df3
SHA1a185f6e21ad591715f5d2a061a82e9e3400e6a14
SHA256c91453f20030eaf2811cd3ae5bbcd8cf8f5e0da111cd61148d68781e1f63472c
SHA512dc4b210bf66a5b28d2638e7a6d5f9ec1faebc37bcc22542f7313e16547e7633cf6488e574ea33beabe6513f4c070ed90ccdb97cce8de61e5e803fe1496b0d7ba
-
Filesize
23KB
MD5b42620f56d958611152358b3e0092df3
SHA1a185f6e21ad591715f5d2a061a82e9e3400e6a14
SHA256c91453f20030eaf2811cd3ae5bbcd8cf8f5e0da111cd61148d68781e1f63472c
SHA512dc4b210bf66a5b28d2638e7a6d5f9ec1faebc37bcc22542f7313e16547e7633cf6488e574ea33beabe6513f4c070ed90ccdb97cce8de61e5e803fe1496b0d7ba
-
Filesize
23KB
MD5b42620f56d958611152358b3e0092df3
SHA1a185f6e21ad591715f5d2a061a82e9e3400e6a14
SHA256c91453f20030eaf2811cd3ae5bbcd8cf8f5e0da111cd61148d68781e1f63472c
SHA512dc4b210bf66a5b28d2638e7a6d5f9ec1faebc37bcc22542f7313e16547e7633cf6488e574ea33beabe6513f4c070ed90ccdb97cce8de61e5e803fe1496b0d7ba