Analysis
-
max time kernel
266s -
max time network
367s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe
Resource
win10v2004-20221111-en
General
-
Target
b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe
-
Size
193KB
-
MD5
02a7a652fee96247813573bf0b2feaec
-
SHA1
ccf14d62043b4f8ca75a5c78f9252c6b5e7883f5
-
SHA256
b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99
-
SHA512
ce7eb448e77196fd633017d7257cde6f97ae493dc02ba3b2de1ab08c02dbc3f51f81c0a88f3fc5290157bfb75ba85f232fc461625a3af471874e4a019d9155e8
-
SSDEEP
3072:99yAofxov3uxWyDTBHKt3jcS8OvbS2ih6FH7sGndT5STyXftHd/y:6PZxWe9I3jcS82uB6FHJndvVd
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 696 regedit.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 320 wrote to memory of 1680 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 27 PID 320 wrote to memory of 1680 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 27 PID 320 wrote to memory of 1680 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 27 PID 320 wrote to memory of 1680 320 b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe 27 PID 1680 wrote to memory of 696 1680 regedt32.exe 28 PID 1680 wrote to memory of 696 1680 regedt32.exe 28 PID 1680 wrote to memory of 696 1680 regedt32.exe 28 PID 1680 wrote to memory of 696 1680 regedt32.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe"C:\Users\Admin\AppData\Local\Temp\b383851804d8ded9ca6210a28455e6ceadb01685ebf915c6a5468ffcd1b9de99.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\regedt32.exe"C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"3⤵
- Runs .reg file with regedit
PID:696
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD58de4e54296bccf7e3708e19598ae4094
SHA1c93b011a41c8c6e54c1cd62cfaaaff8e4117566b
SHA25671cd8b043f97f2f978cad3f6e7aa56017bbfaecd63e4ba3da080508893bec423
SHA5129f3bff0260c17d115da06cb9ffd70a3cd42b26744faff6fd2a42dd4f4533c83c6047bd837884c738424e36a96ac4a46f4944e55a32ed75aa46f94921f602bb02
-
Filesize
42KB
MD52ab189d22ef09f67f6f97695153d5b8b
SHA16c02fa9f9b0d16cd3cbf7e7490650bfec238cdef
SHA256823ea43243dc7e4533cf2ecde22b851ca6b6f7e730001f809416c5ab09dfd68d
SHA51256f0a52f6621c38025159b0ebe7b0a2d3d55d68341321cc82a6910eae0173629c813272049789838dcdcf1101a839e12860cb1cc4ecae0213687c4da2d8b048a