Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2023, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
bf6d7ef816adc36ef6287f9f95846cb0
-
SHA1
f2d0c11c14bf93bc5e322487eaf3e0fda57d5f80
-
SHA256
e51284195d4e78e4def969fe7c5e40252aef6c5d15b6f580412a1f5a805640be
-
SHA512
38cb9b3d1350953842dee7f14f6187297559ceed6a79c4f9212829288a61f8e9a46096ea57edf2ef28b40e4dddf57a9d27a657408f65513275b520ef39c410c3
-
SSDEEP
24576:9pniRXsnvJZe1GGfCzF6oiW7XsJql/J4OI5FqXt3tGMRpj1raaJ47/8UyWpIqloC:viqnvJUAGfCzMoxXO6BdGQQ6g8UkqBr
Malware Config
Extracted
nymaim
45.139.105.171
85.31.46.167
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1272 is-OFF5J.tmp 4216 SplitFiles131.exe 3976 vCieBl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation SplitFiles131.exe -
Loads dropped DLL 1 IoCs
pid Process 1272 is-OFF5J.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Split Files\is-8NA53.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\is-POCL4.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\is-22J4N.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\unins000.dat is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-VVM1P.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-N25PD.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-JA2FC.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-64VCA.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\is-PFGAR.tmp is-OFF5J.tmp File opened for modification C:\Program Files (x86)\Split Files\unins000.dat is-OFF5J.tmp File opened for modification C:\Program Files (x86)\Split Files\SplitFiles131.exe is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-AVOP4.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-MEM4H.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-107T1.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\is-MQ1AB.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-M0V9B.tmp is-OFF5J.tmp File created C:\Program Files (x86)\Split Files\language\is-65G38.tmp is-OFF5J.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 3676 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4216 SplitFiles131.exe 4216 SplitFiles131.exe 4216 SplitFiles131.exe 4216 SplitFiles131.exe 4216 SplitFiles131.exe 4216 SplitFiles131.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3676 taskkill.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1272 2124 file.exe 80 PID 2124 wrote to memory of 1272 2124 file.exe 80 PID 2124 wrote to memory of 1272 2124 file.exe 80 PID 1272 wrote to memory of 4216 1272 is-OFF5J.tmp 81 PID 1272 wrote to memory of 4216 1272 is-OFF5J.tmp 81 PID 1272 wrote to memory of 4216 1272 is-OFF5J.tmp 81 PID 4216 wrote to memory of 3976 4216 SplitFiles131.exe 84 PID 4216 wrote to memory of 3976 4216 SplitFiles131.exe 84 PID 4216 wrote to memory of 3976 4216 SplitFiles131.exe 84 PID 4216 wrote to memory of 4016 4216 SplitFiles131.exe 90 PID 4216 wrote to memory of 4016 4216 SplitFiles131.exe 90 PID 4216 wrote to memory of 4016 4216 SplitFiles131.exe 90 PID 4016 wrote to memory of 3676 4016 cmd.exe 92 PID 4016 wrote to memory of 3676 4016 cmd.exe 92 PID 4016 wrote to memory of 3676 4016 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\is-G87I7.tmp\is-OFF5J.tmp"C:\Users\Admin\AppData\Local\Temp\is-G87I7.tmp\is-OFF5J.tmp" /SL4 $D003C "C:\Users\Admin\AppData\Local\Temp\file.exe" 1679312 1704962⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Split Files\SplitFiles131.exe"C:\Program Files (x86)\Split Files\SplitFiles131.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Roaming\{6e1ce040-6208-11ed-b5ce-806e6f6e6963}\vCieBl.exe
- Executes dropped EXE
PID:3976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "SplitFiles131.exe" /f & erase "C:\Program Files (x86)\Split Files\SplitFiles131.exe" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "SplitFiles131.exe" /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5889f2b7b160ac1e715626dfc676c876c
SHA1acd47a9b64f84dbb3e848bd3a522b57e7def94a4
SHA2561177fa6b852435f02fb5c93255150841b5db8d44fbc645a57c3d8c64803bac32
SHA51219ac2e1aa9616a9a03450f1f4cb43d2b6040eeffaeec3ad7c8a20be69cc01ac29f260993b3069e4f97289e62c5777de33079c5f063ab9ec9575bdfd9e749a0cd
-
Filesize
3.1MB
MD5889f2b7b160ac1e715626dfc676c876c
SHA1acd47a9b64f84dbb3e848bd3a522b57e7def94a4
SHA2561177fa6b852435f02fb5c93255150841b5db8d44fbc645a57c3d8c64803bac32
SHA51219ac2e1aa9616a9a03450f1f4cb43d2b6040eeffaeec3ad7c8a20be69cc01ac29f260993b3069e4f97289e62c5777de33079c5f063ab9ec9575bdfd9e749a0cd
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
760KB
MD5e8176050192fbb976d70238e3c121f4c
SHA12f1fd24efe1f3f3fee775cc3f5255b32f8880900
SHA256ab4fe42a7b708ddb648bb2088216ff47b877ae599fd52ff50359fc1db8e11ef7
SHA51227edf7a71c6546f1ab52e7ef97e404975ddd237d6c2d1038d24a49eab724971884510f00f427c713adb105857a0b12c7d57ca1ca1c70a6cefed4be619c345f4c
-
Filesize
760KB
MD5e8176050192fbb976d70238e3c121f4c
SHA12f1fd24efe1f3f3fee775cc3f5255b32f8880900
SHA256ab4fe42a7b708ddb648bb2088216ff47b877ae599fd52ff50359fc1db8e11ef7
SHA51227edf7a71c6546f1ab52e7ef97e404975ddd237d6c2d1038d24a49eab724971884510f00f427c713adb105857a0b12c7d57ca1ca1c70a6cefed4be619c345f4c
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c