Analysis
-
max time kernel
57s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 01:52
Behavioral task
behavioral1
Sample
b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe
Resource
win10v2004-20221111-en
General
-
Target
b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe
-
Size
317KB
-
MD5
108fba088fdc348c8d72ea5a7cea77e0
-
SHA1
3af8475127846dbd4d1d53c723d3cc3991a7f292
-
SHA256
b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6
-
SHA512
5174cbad769a4f320ed138c622b71a359edaf3dfc1c69ebad51619e2fba8a981c47d88700c0a0cf2231a9072bd76c9f021a37602f372ea64ecbb18cf8e6b93f7
-
SSDEEP
3072:kOXpHv1O0koutuVxz+8YPmK8d4aSnww00ptcfMPBm7pcC787LgJsnVZ7YK7fk7oa:JpmoSujMPgd4aSnF00LcUCMgJsnPtPC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1140-55-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/1140-62-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Zurik System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\antimalware.exe" reg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Acrobat Reader = "C:\\Users\\Admin\\AppData\\Local\\Temp\\antihosts.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1140 wrote to memory of 524 1140 b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe 27 PID 1140 wrote to memory of 524 1140 b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe 27 PID 1140 wrote to memory of 524 1140 b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe 27 PID 1140 wrote to memory of 524 1140 b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe 27 PID 524 wrote to memory of 572 524 cmd.exe 29 PID 524 wrote to memory of 572 524 cmd.exe 29 PID 524 wrote to memory of 572 524 cmd.exe 29 PID 524 wrote to memory of 572 524 cmd.exe 29 PID 524 wrote to memory of 764 524 cmd.exe 30 PID 524 wrote to memory of 764 524 cmd.exe 30 PID 524 wrote to memory of 764 524 cmd.exe 30 PID 524 wrote to memory of 764 524 cmd.exe 30 PID 524 wrote to memory of 1440 524 cmd.exe 31 PID 524 wrote to memory of 1440 524 cmd.exe 31 PID 524 wrote to memory of 1440 524 cmd.exe 31 PID 524 wrote to memory of 1440 524 cmd.exe 31 PID 524 wrote to memory of 1924 524 cmd.exe 32 PID 524 wrote to memory of 1924 524 cmd.exe 32 PID 524 wrote to memory of 1924 524 cmd.exe 32 PID 524 wrote to memory of 1924 524 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe"C:\Users\Admin\AppData\Local\Temp\b10f7a65037cfa81c37661ca7962d54b8a954d1c427e1d840acf24866ae549b6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\F3A3.tmp\loadzinho.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "Zurik System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\antimalware.exe" /f3⤵
- Adds Run key to start application
PID:572
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "Acrobat Reader" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\antihosts.exe" /f3⤵
- Adds Run key to start application
PID:764
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\antihosts.exe""3⤵PID:1440
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\antimalware.exe""3⤵PID:1924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f01c29416ebdf052d17bcec0b3320dcf
SHA11b1e802de2828a5f56661904b174d073f76939a1
SHA25694909b9fa5fd275de8d14187a39800a5e5fc60e9b46f5f95501b34cc42bede32
SHA51269f7ff74a3677130dfa01b11f77c043b2bba345e532881bc47b7fd2f1fb3ac84a897464142b8f6cfb4c1eb02dadb7808ec2433af7107ca872e14bd12cc533ceb