Analysis
-
max time kernel
123s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe
Resource
win10v2004-20220812-en
General
-
Target
b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe
-
Size
446KB
-
MD5
52d59550f7c6c6570eea4e7e5d346073
-
SHA1
de26b3973e1c1e45acf53445136bc8a46f125efc
-
SHA256
b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3
-
SHA512
8f6141503da0b75d1936b08f04c6be6e614f31faffa302b691887dbc83f991d90694a815d95f3b149771ad6fceff41c5c662feab553840347ade4695387d6b13
-
SSDEEP
6144:5ZunObR8sVImcyYC5Jsz3jzB8kOQIq+3mxkyJIrC+J/pbKvCB23xqy7uXhY7pOKo:WK+mza/6Y+4hupHQYyqXh6ZyDl9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 564 loadwg.exe 108 qqzyhxwg.exe -
resource yara_rule behavioral1/files/0x00090000000139a6-55.dat upx behavioral1/files/0x00090000000139a6-56.dat upx behavioral1/files/0x00090000000139a6-58.dat upx behavioral1/files/0x00090000000139a6-60.dat upx behavioral1/memory/564-62-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral1/memory/564-63-0x0000000000400000-0x00000000004AC000-memory.dmp upx -
Loads dropped DLL 7 IoCs
pid Process 1208 b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe 1208 b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe 564 loadwg.exe 564 loadwg.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/564-62-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral1/memory/564-63-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1880 108 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 564 loadwg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 564 loadwg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1208 wrote to memory of 564 1208 b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe 28 PID 1208 wrote to memory of 564 1208 b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe 28 PID 1208 wrote to memory of 564 1208 b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe 28 PID 1208 wrote to memory of 564 1208 b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe 28 PID 564 wrote to memory of 108 564 loadwg.exe 31 PID 564 wrote to memory of 108 564 loadwg.exe 31 PID 564 wrote to memory of 108 564 loadwg.exe 31 PID 564 wrote to memory of 108 564 loadwg.exe 31 PID 108 wrote to memory of 1880 108 qqzyhxwg.exe 32 PID 108 wrote to memory of 1880 108 qqzyhxwg.exe 32 PID 108 wrote to memory of 1880 108 qqzyhxwg.exe 32 PID 108 wrote to memory of 1880 108 qqzyhxwg.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe"C:\Users\Admin\AppData\Local\Temp\b49722b1fdc2c3fa1449c6fb3651d89f590e975cdf1895845a39cb17566b1ea3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\qqzyhxwg.exeqqzyhxwg.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 108 -s 364⤵
- Loads dropped DLL
- Program crash
PID:1880
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e
-
Filesize
19KB
MD5f07e706286878fc4350bb024e60e3533
SHA1ec907629583e1235fc989b2ba84bdf8c90da3e03
SHA256f89a93eb72e15acc85d3bc2cc9cf12e943c0ac397f97b606c332ae4b47ca2127
SHA512948b04fd4f37ff539dd7f6c2ed5f8ea1004dbdceb4d900884c23f03f756985202675dfd4d3a5754614ec0e71bdf2aedc3f24e62f97c4629866fee458f2e3d110
-
Filesize
19KB
MD5f07e706286878fc4350bb024e60e3533
SHA1ec907629583e1235fc989b2ba84bdf8c90da3e03
SHA256f89a93eb72e15acc85d3bc2cc9cf12e943c0ac397f97b606c332ae4b47ca2127
SHA512948b04fd4f37ff539dd7f6c2ed5f8ea1004dbdceb4d900884c23f03f756985202675dfd4d3a5754614ec0e71bdf2aedc3f24e62f97c4629866fee458f2e3d110
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e
-
Filesize
19KB
MD5f07e706286878fc4350bb024e60e3533
SHA1ec907629583e1235fc989b2ba84bdf8c90da3e03
SHA256f89a93eb72e15acc85d3bc2cc9cf12e943c0ac397f97b606c332ae4b47ca2127
SHA512948b04fd4f37ff539dd7f6c2ed5f8ea1004dbdceb4d900884c23f03f756985202675dfd4d3a5754614ec0e71bdf2aedc3f24e62f97c4629866fee458f2e3d110
-
Filesize
19KB
MD5f07e706286878fc4350bb024e60e3533
SHA1ec907629583e1235fc989b2ba84bdf8c90da3e03
SHA256f89a93eb72e15acc85d3bc2cc9cf12e943c0ac397f97b606c332ae4b47ca2127
SHA512948b04fd4f37ff539dd7f6c2ed5f8ea1004dbdceb4d900884c23f03f756985202675dfd4d3a5754614ec0e71bdf2aedc3f24e62f97c4629866fee458f2e3d110
-
Filesize
19KB
MD5f07e706286878fc4350bb024e60e3533
SHA1ec907629583e1235fc989b2ba84bdf8c90da3e03
SHA256f89a93eb72e15acc85d3bc2cc9cf12e943c0ac397f97b606c332ae4b47ca2127
SHA512948b04fd4f37ff539dd7f6c2ed5f8ea1004dbdceb4d900884c23f03f756985202675dfd4d3a5754614ec0e71bdf2aedc3f24e62f97c4629866fee458f2e3d110
-
Filesize
19KB
MD5f07e706286878fc4350bb024e60e3533
SHA1ec907629583e1235fc989b2ba84bdf8c90da3e03
SHA256f89a93eb72e15acc85d3bc2cc9cf12e943c0ac397f97b606c332ae4b47ca2127
SHA512948b04fd4f37ff539dd7f6c2ed5f8ea1004dbdceb4d900884c23f03f756985202675dfd4d3a5754614ec0e71bdf2aedc3f24e62f97c4629866fee458f2e3d110
-
Filesize
19KB
MD5f07e706286878fc4350bb024e60e3533
SHA1ec907629583e1235fc989b2ba84bdf8c90da3e03
SHA256f89a93eb72e15acc85d3bc2cc9cf12e943c0ac397f97b606c332ae4b47ca2127
SHA512948b04fd4f37ff539dd7f6c2ed5f8ea1004dbdceb4d900884c23f03f756985202675dfd4d3a5754614ec0e71bdf2aedc3f24e62f97c4629866fee458f2e3d110