Analysis
-
max time kernel
116s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe
Resource
win10v2004-20221111-en
General
-
Target
f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe
-
Size
25.2MB
-
MD5
f6870be4afb8703b537955e5f7e85ef3
-
SHA1
f10c8ad29f9af87585f582ff9c99ea08b586f470
-
SHA256
f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1
-
SHA512
f9c96a4ff3bd2b27d3fd2affdc5a92cf14456f13dfdef823de186cc90f6e975650b66788096fa546e594acec3d66340ea659a693fbe8d5e2c0d780c8f4fa4857
-
SSDEEP
98304:fzicAgirs+wz5tqVFhjbA5t8v4Xr9rGjoQqu5LsCA57sM9G9woz:Li8aKzzqvhja8v0r9rGfwCA5Ip9wI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 764 3ddown.com_PE.Explorer_setup.exe 1688 is-66ECR.tmp -
Loads dropped DLL 6 IoCs
pid Process 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 764 3ddown.com_PE.Explorer_setup.exe 764 3ddown.com_PE.Explorer_setup.exe 764 3ddown.com_PE.Explorer_setup.exe 1688 is-66ECR.tmp 1688 is-66ECR.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3ddown.com_PE.Explorer = "C:\\Users\\Public\\Opilj\\Faat.exe /3ddown.com_PE.Explorer /{7CA4FB64-36A6-4462-A35B-86B4C1B7CD9F}" f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 528 wrote to memory of 1464 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 27 PID 528 wrote to memory of 1464 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 27 PID 528 wrote to memory of 1464 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 27 PID 528 wrote to memory of 1464 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 27 PID 528 wrote to memory of 1464 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 27 PID 528 wrote to memory of 1464 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 27 PID 528 wrote to memory of 1464 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 27 PID 1464 wrote to memory of 568 1464 Net.exe 29 PID 1464 wrote to memory of 568 1464 Net.exe 29 PID 1464 wrote to memory of 568 1464 Net.exe 29 PID 1464 wrote to memory of 568 1464 Net.exe 29 PID 1464 wrote to memory of 568 1464 Net.exe 29 PID 1464 wrote to memory of 568 1464 Net.exe 29 PID 1464 wrote to memory of 568 1464 Net.exe 29 PID 528 wrote to memory of 764 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 30 PID 528 wrote to memory of 764 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 30 PID 528 wrote to memory of 764 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 30 PID 528 wrote to memory of 764 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 30 PID 528 wrote to memory of 764 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 30 PID 528 wrote to memory of 764 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 30 PID 528 wrote to memory of 764 528 f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe 30 PID 764 wrote to memory of 1688 764 3ddown.com_PE.Explorer_setup.exe 31 PID 764 wrote to memory of 1688 764 3ddown.com_PE.Explorer_setup.exe 31 PID 764 wrote to memory of 1688 764 3ddown.com_PE.Explorer_setup.exe 31 PID 764 wrote to memory of 1688 764 3ddown.com_PE.Explorer_setup.exe 31 PID 764 wrote to memory of 1688 764 3ddown.com_PE.Explorer_setup.exe 31 PID 764 wrote to memory of 1688 764 3ddown.com_PE.Explorer_setup.exe 31 PID 764 wrote to memory of 1688 764 3ddown.com_PE.Explorer_setup.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe"C:\Users\Admin\AppData\Local\Temp\f8f7a8a64c5f0df58ea7c8283b5388609140b788693107dd924edfed84c89ea1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\Net.exeNet Stop PcaSvc2⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 Stop PcaSvc3⤵PID:568
-
-
-
C:\Users\Admin\AppData\Local\Temp\g8A0C3\3ddown.com_PE.Explorer_setup.exeC:\Users\Admin\AppData\Local\Temp\g8A0C3\3ddown.com_PE.Explorer_setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\is-ITT2V.tmp\is-66ECR.tmp"C:\Users\Admin\AppData\Local\Temp\is-ITT2V.tmp\is-66ECR.tmp" /SL4 $90126 "C:\Users\Admin\AppData\Local\Temp\g8A0C3\3ddown.com_PE.Explorer_setup.exe" 3309744 721923⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5a1ce79004847ae73d01d2bc4b74fae02
SHA16103ae43464c4ffe005b790d2fa52dddd8ceb67b
SHA256253caa8fc7021202e65372972e447cab37a2f781d6c0b3f46d7943437e190fd6
SHA512f22230fd33498bb7be3d529725e3ad6d09d35b15603f7b33450016a69de785dbde021909d5cf837a2d754146f8f4bb223294797ef1ba0ad21076769d371d1746
-
Filesize
3.4MB
MD5a1ce79004847ae73d01d2bc4b74fae02
SHA16103ae43464c4ffe005b790d2fa52dddd8ceb67b
SHA256253caa8fc7021202e65372972e447cab37a2f781d6c0b3f46d7943437e190fd6
SHA512f22230fd33498bb7be3d529725e3ad6d09d35b15603f7b33450016a69de785dbde021909d5cf837a2d754146f8f4bb223294797ef1ba0ad21076769d371d1746
-
Filesize
657KB
MD53dafb498bb15d5260cb2c12b391a0d48
SHA1c775ae9fdf18ab0ce38a8adffabe378f461e79a1
SHA256c5d5f5f814c5bc4989d691442051e5e78cf1971eb9b773a7a26b438e58a73d7a
SHA512a42f39a73bd4615490c6e33c017fa09f9992e3327d244b050b6634ad696d421170fd63ec5d5e66e92d112dc804eabd0bcd56494c9499d78fad8b46fe2ef32a31
-
Filesize
657KB
MD53dafb498bb15d5260cb2c12b391a0d48
SHA1c775ae9fdf18ab0ce38a8adffabe378f461e79a1
SHA256c5d5f5f814c5bc4989d691442051e5e78cf1971eb9b773a7a26b438e58a73d7a
SHA512a42f39a73bd4615490c6e33c017fa09f9992e3327d244b050b6634ad696d421170fd63ec5d5e66e92d112dc804eabd0bcd56494c9499d78fad8b46fe2ef32a31
-
Filesize
3.4MB
MD5a1ce79004847ae73d01d2bc4b74fae02
SHA16103ae43464c4ffe005b790d2fa52dddd8ceb67b
SHA256253caa8fc7021202e65372972e447cab37a2f781d6c0b3f46d7943437e190fd6
SHA512f22230fd33498bb7be3d529725e3ad6d09d35b15603f7b33450016a69de785dbde021909d5cf837a2d754146f8f4bb223294797ef1ba0ad21076769d371d1746
-
Filesize
3.4MB
MD5a1ce79004847ae73d01d2bc4b74fae02
SHA16103ae43464c4ffe005b790d2fa52dddd8ceb67b
SHA256253caa8fc7021202e65372972e447cab37a2f781d6c0b3f46d7943437e190fd6
SHA512f22230fd33498bb7be3d529725e3ad6d09d35b15603f7b33450016a69de785dbde021909d5cf837a2d754146f8f4bb223294797ef1ba0ad21076769d371d1746
-
Filesize
3.4MB
MD5a1ce79004847ae73d01d2bc4b74fae02
SHA16103ae43464c4ffe005b790d2fa52dddd8ceb67b
SHA256253caa8fc7021202e65372972e447cab37a2f781d6c0b3f46d7943437e190fd6
SHA512f22230fd33498bb7be3d529725e3ad6d09d35b15603f7b33450016a69de785dbde021909d5cf837a2d754146f8f4bb223294797ef1ba0ad21076769d371d1746
-
Filesize
657KB
MD53dafb498bb15d5260cb2c12b391a0d48
SHA1c775ae9fdf18ab0ce38a8adffabe378f461e79a1
SHA256c5d5f5f814c5bc4989d691442051e5e78cf1971eb9b773a7a26b438e58a73d7a
SHA512a42f39a73bd4615490c6e33c017fa09f9992e3327d244b050b6634ad696d421170fd63ec5d5e66e92d112dc804eabd0bcd56494c9499d78fad8b46fe2ef32a31
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3