Analysis
-
max time kernel
50s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
25/12/2022, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5.exe
Resource
win10-20220901-en
General
-
Target
82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5.exe
-
Size
1.6MB
-
MD5
9a618ee09703dd956880184e9ae7b79f
-
SHA1
9952585e3e6b641e4c2e3ac9e357b664fe6ad252
-
SHA256
82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5
-
SHA512
bafb1ff9efde7c4187c04ce3171863ab84ffd456ca4e6d0f998b7b343a79a1fe933774e553e3fb17bb01c9c8bcd9368e146c78a4a7d1b693332ff013df002ba3
-
SSDEEP
24576:5HLmCiIhiXJfhSX7V10TWOjQc7qnWc+CZGvs1mM29odLqSdtB1WLzJfA1iYqr7/+:qVEVYWOv7tCCkmidL91GJfAZS7pPPI
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3388 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3388 2796 82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5.exe 66 PID 2796 wrote to memory of 3388 2796 82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5.exe 66 PID 2796 wrote to memory of 3388 2796 82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5.exe"C:\Users\Admin\AppData\Local\Temp\82ba59eb77a12cadd649ce3f532f935d8797908a58623c8699081b3d8114b7e5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /u /s .\F_G9.GJO2⤵
- Loads dropped DLL
PID:3388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD52e4ce512efadb8b3cda385c85a791d72
SHA194f2f845d9b877e9b690f37eeaadef3d635405ae
SHA256f13e32d625504d3f364fd1f8ba6d4580fdebfc602826ace5b780876d36015cc0
SHA512b81b4414c259800b3de4b0b33ef63ba179d168a5690a922ee48e8a87169d9f9eae5e1b33a0a1bc74a68adddcf68bfd027f7ec17375567f089fdc4d6e269cf33f
-
Filesize
1.6MB
MD52e4ce512efadb8b3cda385c85a791d72
SHA194f2f845d9b877e9b690f37eeaadef3d635405ae
SHA256f13e32d625504d3f364fd1f8ba6d4580fdebfc602826ace5b780876d36015cc0
SHA512b81b4414c259800b3de4b0b33ef63ba179d168a5690a922ee48e8a87169d9f9eae5e1b33a0a1bc74a68adddcf68bfd027f7ec17375567f089fdc4d6e269cf33f