Analysis
-
max time kernel
31s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
773fb681c3115952129dfab8a192b111.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
773fb681c3115952129dfab8a192b111.exe
Resource
win10v2004-20220812-en
General
-
Target
773fb681c3115952129dfab8a192b111.exe
-
Size
347KB
-
MD5
773fb681c3115952129dfab8a192b111
-
SHA1
6cad9d1d3f6d3607bc8dcd388c972056c6184dc7
-
SHA256
613355f77c2dd5064b640d8076626299a4f023512d9ee9301c674995f382b88c
-
SHA512
ffcaacf102264a20fed98bee11b15ade13c98062e42f70fc52d73897adb278b6c2f96e3cfce0993d9f94d31bc1914f7ac3c017d30de704f3a002f84b2fb3f3e0
-
SSDEEP
6144:HBnAU1X9Tel6FV4aUR4VC+S7VK85ibLbSu+:WU1+6FV494iJKJfSu+
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1504 dibdtf.exe 2036 dibdtf.exe -
Loads dropped DLL 5 IoCs
pid Process 1592 773fb681c3115952129dfab8a192b111.exe 1504 dibdtf.exe 1980 WerFault.exe 1980 WerFault.exe 1980 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\svkbkv = "C:\\Users\\Admin\\AppData\\Roaming\\mrnlwpcqqnhuk\\qjasx.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dibdtf.exe\" C:\\Users\\Admin\\AppData\\Local" dibdtf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1504 set thread context of 2036 1504 dibdtf.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1980 2036 WerFault.exe 28 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1504 dibdtf.exe 1504 dibdtf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1504 1592 773fb681c3115952129dfab8a192b111.exe 27 PID 1592 wrote to memory of 1504 1592 773fb681c3115952129dfab8a192b111.exe 27 PID 1592 wrote to memory of 1504 1592 773fb681c3115952129dfab8a192b111.exe 27 PID 1592 wrote to memory of 1504 1592 773fb681c3115952129dfab8a192b111.exe 27 PID 1504 wrote to memory of 2036 1504 dibdtf.exe 28 PID 1504 wrote to memory of 2036 1504 dibdtf.exe 28 PID 1504 wrote to memory of 2036 1504 dibdtf.exe 28 PID 1504 wrote to memory of 2036 1504 dibdtf.exe 28 PID 1504 wrote to memory of 2036 1504 dibdtf.exe 28 PID 2036 wrote to memory of 1980 2036 dibdtf.exe 29 PID 2036 wrote to memory of 1980 2036 dibdtf.exe 29 PID 2036 wrote to memory of 1980 2036 dibdtf.exe 29 PID 2036 wrote to memory of 1980 2036 dibdtf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\773fb681c3115952129dfab8a192b111.exe"C:\Users\Admin\AppData\Local\Temp\773fb681c3115952129dfab8a192b111.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\dibdtf.exe"C:\Users\Admin\AppData\Local\Temp\dibdtf.exe" C:\Users\Admin\AppData\Local\Temp\dvvabwhzxx.i2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\dibdtf.exe"C:\Users\Admin\AppData\Local\Temp\dibdtf.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 1844⤵
- Loads dropped DLL
- Program crash
PID:1980
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
7KB
MD535624c6acd0194e2e770e3395b572d3a
SHA14254b904007d09fe30b818cc5598eade268cf733
SHA25655049d092cd835e31d70707dbf7098835bd9ad0c388352e6ca9f7604cd570974
SHA512342f3ce332bf0bf635fc6c0087dd2915aad95a22afd005ae12e79e9d069552e1920180e70b9842e15b53cf77d50280b3e0162d6aa1103a253560aeae17a5a47a
-
Filesize
98KB
MD55dfce1ea3fcdb244cb1fbc3c16f15fe2
SHA191a9a5001b6f44937b861c7c4739290d9d4e7016
SHA256f2ed263a2dc26bcb9fc7c192aa31ef33af78491a2d57384bb5efb06bdff50acc
SHA512421c7ed3909b95f708e1e5b70bba65f1a0f0a7c4ddaa48e68a3c649dd6f59622b8ec7b4d9ecfabf9aa879582d2c624e779622f57fec852a5a5f26c5c32e9a6b2
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50
-
Filesize
12KB
MD536063c9383803d4b38d2aa4f8ea183d5
SHA18e7b673b92a8f000ad9ac42241d28e7fb0c91c90
SHA25609989a869b01d91b480e2b9aeadebf07d979372476cc4a3d970941c640977f46
SHA51206d14033ff4853d3b0135dffaccf7465b485503d903a9e8a69c88eb9432781cda05fa8023666639781196a555422723d822f0575cb08cb144ff009cb23091f50