Analysis
-
max time kernel
93s -
max time network
177s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe
Resource
win10v2004-20220901-en
General
-
Target
6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe
-
Size
52KB
-
MD5
6b53539d0d312b75eb336814fae39c41
-
SHA1
34758154d05db611d331978b1289f787cf0ef08f
-
SHA256
6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da
-
SHA512
04781d1878a2e11ae733f537c3798bfafdec9dec77ca35be4f9bfb045acb6711d1bb3a52cb37289154539b81f470d9e84e252e0a6008fdb79e1a06399024e903
-
SSDEEP
1536:MzCipQhVqbA0jhg5ZE9lD72bZOdfLDAILis0:0p4wYgln29aA1s
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 268 svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 696 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 268 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 636 6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe 636 6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 636 wrote to memory of 268 636 6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe 28 PID 636 wrote to memory of 268 636 6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe 28 PID 636 wrote to memory of 268 636 6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe 28 PID 636 wrote to memory of 268 636 6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe 28 PID 268 wrote to memory of 696 268 svchost.exe 29 PID 268 wrote to memory of 696 268 svchost.exe 29 PID 268 wrote to memory of 696 268 svchost.exe 29 PID 268 wrote to memory of 696 268 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe"C:\Users\Admin\AppData\Local\Temp\6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.txt3⤵
- Opens file in notepad (likely ransom note)
PID:696
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6bdc8f03ba48c73984b8d8a4c0d8916a4ea17d2baf2b0763faea46e44e99a5da.txt
Filesize36B
MD51123526e0d34644d9ff8b94378b07ba1
SHA12997bdce99c9d7eeeb6ab2f55a6b246748ba9ae3
SHA25601166f19ae656c254351e749ecab3b3956c3242c5653e299aaa4f3830cce505e
SHA5122defbc915b4e0ab4320bbe23ab71c5a911fa538031c415de47f2d58190267a91215ac4469c8f115c7d6f21bb775e2232ddc3ae898a8d75ec2dae9a52e884b8e6