Analysis
-
max time kernel
35s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 21:27
Static task
static1
Behavioral task
behavioral1
Sample
398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe
Resource
win10v2004-20220901-en
General
-
Target
398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe
-
Size
13.1MB
-
MD5
439138f86ff7e31a1fdc71f869cc74e2
-
SHA1
5fe9893526550342333bb4994465bd291fb0886a
-
SHA256
398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce
-
SHA512
487a8481e5aa73728a43f4c9c13ff36dda3f79d4d87547f83e3710b5a96fa13a3bffdd7341ecce8bb3ec94569b867f58af0827723bb652a49a2c55242ec16509
-
SSDEEP
393216:wMSglZEAhgHglnbXDK6Owzjv39c9KfVw36HmDFtyxJidd36n2sg:uAyHGbXDK6bG9KfVs6HmRy+dT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 1256 398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe 1984 Setup.exe 1984 Setup.exe 1984 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1984 Setup.exe 1984 Setup.exe 1984 Setup.exe 1984 Setup.exe 1984 Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1984 1256 398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe 27 PID 1256 wrote to memory of 1984 1256 398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe 27 PID 1256 wrote to memory of 1984 1256 398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe 27 PID 1256 wrote to memory of 1984 1256 398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe 27 PID 1256 wrote to memory of 1984 1256 398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe 27 PID 1256 wrote to memory of 1984 1256 398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe 27 PID 1256 wrote to memory of 1984 1256 398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe"C:\Users\Admin\AppData\Local\Temp\398a7bc66e47d5e98192e75f66f4398de1618a0544540564b669d79aea8b0bce.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894B
MD579bbc855e55ec936c5c95ecbab7c8ef1
SHA151a1086a6dd0c1be4b7e82cfc063f5e14d0b9042
SHA256b74779910d1faa21544eebeff89e163edfa37be53f7ccd6ecc429cec6cea8cc0
SHA5129a2c087402b27acf65ae63b2e6d7792e16cd54d1cf0dba14088c60450d4fea8ac38da58ac42c9e90525ad94afe1dcee6b742942203fafee346c1332795d4eda6
-
Filesize
1.3MB
MD5b99251ce62a22a1a8ab9a8514bc78258
SHA1d0df8d905911e4c96e9d359ae431f1e1bdf3cf0b
SHA2562dd2adbc08a3456a3b5edfa86d0c1dfadedf86869dbc90f8a8b751dcdc6d9cc1
SHA512566bb9ef8498ae0b98aebfa6eb90e6cc90d08c819e09ca26bb57dfe9f9ed10112a757cfec137444d76a63cb9a0554a72ed08f12fb3e87d2f0c02ce417d4ac5bf
-
Filesize
1.3MB
MD5b99251ce62a22a1a8ab9a8514bc78258
SHA1d0df8d905911e4c96e9d359ae431f1e1bdf3cf0b
SHA2562dd2adbc08a3456a3b5edfa86d0c1dfadedf86869dbc90f8a8b751dcdc6d9cc1
SHA512566bb9ef8498ae0b98aebfa6eb90e6cc90d08c819e09ca26bb57dfe9f9ed10112a757cfec137444d76a63cb9a0554a72ed08f12fb3e87d2f0c02ce417d4ac5bf
-
Filesize
166KB
MD51f917e562921b98e356bd43e14bcb04d
SHA117cd7e057f2716c8e622f459421d0ef106cae226
SHA2568a08f2fc1a59137a7564b2ee756be4389e8e2f2dbd9bd0a9d3bba203d3a84cbd
SHA512fe1e09923439ed02b411c4bee730015003cef52a685cc3cd2fb939a0837f57304d91984354c6abcbf3758d4bdf4e82ef7de68bc74c656fd5f7551ffc6f2516a1
-
Filesize
1.3MB
MD5b99251ce62a22a1a8ab9a8514bc78258
SHA1d0df8d905911e4c96e9d359ae431f1e1bdf3cf0b
SHA2562dd2adbc08a3456a3b5edfa86d0c1dfadedf86869dbc90f8a8b751dcdc6d9cc1
SHA512566bb9ef8498ae0b98aebfa6eb90e6cc90d08c819e09ca26bb57dfe9f9ed10112a757cfec137444d76a63cb9a0554a72ed08f12fb3e87d2f0c02ce417d4ac5bf
-
Filesize
1.3MB
MD5b99251ce62a22a1a8ab9a8514bc78258
SHA1d0df8d905911e4c96e9d359ae431f1e1bdf3cf0b
SHA2562dd2adbc08a3456a3b5edfa86d0c1dfadedf86869dbc90f8a8b751dcdc6d9cc1
SHA512566bb9ef8498ae0b98aebfa6eb90e6cc90d08c819e09ca26bb57dfe9f9ed10112a757cfec137444d76a63cb9a0554a72ed08f12fb3e87d2f0c02ce417d4ac5bf
-
Filesize
1.3MB
MD5b99251ce62a22a1a8ab9a8514bc78258
SHA1d0df8d905911e4c96e9d359ae431f1e1bdf3cf0b
SHA2562dd2adbc08a3456a3b5edfa86d0c1dfadedf86869dbc90f8a8b751dcdc6d9cc1
SHA512566bb9ef8498ae0b98aebfa6eb90e6cc90d08c819e09ca26bb57dfe9f9ed10112a757cfec137444d76a63cb9a0554a72ed08f12fb3e87d2f0c02ce417d4ac5bf
-
Filesize
1.3MB
MD5b99251ce62a22a1a8ab9a8514bc78258
SHA1d0df8d905911e4c96e9d359ae431f1e1bdf3cf0b
SHA2562dd2adbc08a3456a3b5edfa86d0c1dfadedf86869dbc90f8a8b751dcdc6d9cc1
SHA512566bb9ef8498ae0b98aebfa6eb90e6cc90d08c819e09ca26bb57dfe9f9ed10112a757cfec137444d76a63cb9a0554a72ed08f12fb3e87d2f0c02ce417d4ac5bf