Analysis
-
max time kernel
57s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 13:54
Static task
static1
Behavioral task
behavioral1
Sample
9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe
Resource
win10v2004-20221111-en
General
-
Target
9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe
-
Size
401KB
-
MD5
3c2bd12f7b7bd7dce1356ee121390e59
-
SHA1
690d0ca0574f5ba2a3ec29ea1486b139b6c1444e
-
SHA256
9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a
-
SHA512
7a94e20f8813bf8ee86ebdde151b834e48eb2f40c7dbd2c5829f85d5a995a082d1ee3ed5dbc7a1ea3d1830ccd7b422e6d22a8bcd3ad6a34abf7fb144432ef128
-
SSDEEP
6144:wLsBN8xoIVidwra/vPrF5bQ5e9eAQIki+uC1szbhQqfP3OvPk:rBrL8AQIki+u5hJXOXk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exepid process 1676 9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
Processes:
9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exedescription ioc process File opened for modification C:\Program Files (x86)\Marehan\Forthought.pec 9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe -
Drops file in Windows directory 6 IoCs
Processes:
9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exedescription ioc process File opened for modification C:\Windows\Fonts\Trynen\Brsnoteringerne\Drpladerne\Forkyndelsers.Bis 9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe File opened for modification C:\Windows\resources\Bladed196.Est 9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe File created C:\Windows\Pignorative.lnk 9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe File opened for modification C:\Windows\Pignorative.lnk 9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe File opened for modification C:\Windows\Mandsdomineredes23\Irreturnable\Copromisor\Summetone.ini 9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe File opened for modification C:\Windows\resources\redigeringsarbejdernes.Fas 9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe"C:\Users\Admin\AppData\Local\Temp\9f24c8aa143c08e781f1af679d50fd0b354b84f7d0aeb69dbe10a902dca5e02a.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD517ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5