Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 07:06
Static task
static1
Behavioral task
behavioral1
Sample
0870a4727fcd6ce557f017f0fed61f51.exe
Resource
win7-20220901-en
General
-
Target
0870a4727fcd6ce557f017f0fed61f51.exe
-
Size
343KB
-
MD5
0870a4727fcd6ce557f017f0fed61f51
-
SHA1
6ad1abe4d5d4f44ea753fb10df927adb1f139f2e
-
SHA256
14afee34b6a36a32b34c61556e46fef92e6a2d9066c758308bb9caea4a94ae2a
-
SHA512
7a97ad7ab0f0f23883ca3ee33fdf5ecca2ee3d28df3295ba3b1f1a04b71c62c7dbb7c3bc41d13ac7a84e286b41d130ef4e07a9ad79e7146e9f44baca513a03c5
-
SSDEEP
6144:ZBnbr9ZL8bM0rCfO4AFSnQNYnx3b+/wmsqplIQ037:HfL8bM9fz8SnQyRWwmxsQg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
vjfiz.exevjfiz.exepid process 1624 vjfiz.exe 1224 vjfiz.exe -
Loads dropped DLL 5 IoCs
Processes:
0870a4727fcd6ce557f017f0fed61f51.exevjfiz.exeWerFault.exepid process 1672 0870a4727fcd6ce557f017f0fed61f51.exe 1624 vjfiz.exe 584 WerFault.exe 584 WerFault.exe 584 WerFault.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
vjfiz.exedescription pid process target process PID 1624 set thread context of 1224 1624 vjfiz.exe vjfiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 584 1224 WerFault.exe vjfiz.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
vjfiz.exepid process 1624 vjfiz.exe 1624 vjfiz.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
0870a4727fcd6ce557f017f0fed61f51.exevjfiz.exevjfiz.exedescription pid process target process PID 1672 wrote to memory of 1624 1672 0870a4727fcd6ce557f017f0fed61f51.exe vjfiz.exe PID 1672 wrote to memory of 1624 1672 0870a4727fcd6ce557f017f0fed61f51.exe vjfiz.exe PID 1672 wrote to memory of 1624 1672 0870a4727fcd6ce557f017f0fed61f51.exe vjfiz.exe PID 1672 wrote to memory of 1624 1672 0870a4727fcd6ce557f017f0fed61f51.exe vjfiz.exe PID 1624 wrote to memory of 1224 1624 vjfiz.exe vjfiz.exe PID 1624 wrote to memory of 1224 1624 vjfiz.exe vjfiz.exe PID 1624 wrote to memory of 1224 1624 vjfiz.exe vjfiz.exe PID 1624 wrote to memory of 1224 1624 vjfiz.exe vjfiz.exe PID 1624 wrote to memory of 1224 1624 vjfiz.exe vjfiz.exe PID 1224 wrote to memory of 584 1224 vjfiz.exe WerFault.exe PID 1224 wrote to memory of 584 1224 vjfiz.exe WerFault.exe PID 1224 wrote to memory of 584 1224 vjfiz.exe WerFault.exe PID 1224 wrote to memory of 584 1224 vjfiz.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0870a4727fcd6ce557f017f0fed61f51.exe"C:\Users\Admin\AppData\Local\Temp\0870a4727fcd6ce557f017f0fed61f51.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"C:\Users\Admin\AppData\Local\Temp\vjfiz.exe" C:\Users\Admin\AppData\Local\Temp\tysrzemvxjx.lq2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"C:\Users\Admin\AppData\Local\Temp\vjfiz.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 364⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dvicdpxumc.gshFilesize
185KB
MD56bff3f9f5f10ca6c482120d288b62b08
SHA1e6e72efca642290d5daaf4c8b2fe5a759e1eadd7
SHA256499c77843bfd10fce945eab5d76cd783cd1f21aba38a1f36f854825d1f2083da
SHA512ba7dd6f593bca04792711c46f22137841efc1663aee27c8bc1fe99bc057b5475ef9240880e2a391eed5e99f59142fb49d3d35d8fc558e096127c601ece4f1d2a
-
C:\Users\Admin\AppData\Local\Temp\tysrzemvxjx.lqFilesize
5KB
MD536cf5f2a5ec6b153ee2c785c517153fa
SHA121fb70c9c27ea827abd77d7adfef003acc7b1b03
SHA25684a0d75969da88bc18370ded6588bca0d05525a24bc472c1c84bade9fc1c0479
SHA512d80a2cd1c4d0f86c64e06b728f99a8dee2239f2f0652cc88b0cd02ee28fda16309b3b7cb70b5254821fcec4b6bee640a431f08986faae8f8173b09cee3c09521
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
C:\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
\Users\Admin\AppData\Local\Temp\vjfiz.exeFilesize
12KB
MD55d2a199396a0bd5027f1d471210eb446
SHA13237dea6926772be66227d29a9b361305734af5a
SHA256ad6a085a27238c1122dfeead4feb7085a04da98ff6805dda8a816d099e46ae97
SHA512899bc54811858e79d64b1146f37208eee74455fa976e65f83c131ed65eb71a609f32fbeccc2de21328dbbcc100f7749520464b550ce65d278254ff6446b37e73
-
memory/584-64-0x0000000000000000-mapping.dmp
-
memory/1224-62-0x00000000000D12B0-mapping.dmp
-
memory/1624-56-0x0000000000000000-mapping.dmp
-
memory/1672-54-0x0000000075111000-0x0000000075113000-memory.dmpFilesize
8KB