Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 18:26
Static task
static1
Behavioral task
behavioral1
Sample
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe
Resource
win7-20220812-en
General
-
Target
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe
-
Size
283KB
-
MD5
eb352086838f3e62929c6982938257e8
-
SHA1
190f97f6ca0e1c058506736e0b5b96e1b4a9b6e2
-
SHA256
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1
-
SHA512
55e1bd1a6617928b74b6ec5e04ce49591f650e2a32bd38d396ce919ba59b65a8f3e27c870e71f8740205be2251954a5867a1e11fa8d94af26b0fb5e1d6cd73d2
-
SSDEEP
6144:+4LuhL2086TbM3v0ofYfyXyqLoittx18a:7mL52v0oiyXy6oCtx18a
Malware Config
Extracted
gootkit
6546
servicemanager.icu
partnerservice.xyz
-
vendor_id
6546
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1124 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.execmd.exedescription pid process target process PID 1620 wrote to memory of 1124 1620 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe cmd.exe PID 1620 wrote to memory of 1124 1620 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe cmd.exe PID 1620 wrote to memory of 1124 1620 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe cmd.exe PID 1620 wrote to memory of 1124 1620 2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe cmd.exe PID 1124 wrote to memory of 2028 1124 cmd.exe attrib.exe PID 1124 wrote to memory of 2028 1124 cmd.exe attrib.exe PID 1124 wrote to memory of 2028 1124 cmd.exe attrib.exe PID 1124 wrote to memory of 2028 1124 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe"C:\Users\Admin\AppData\Local\Temp\2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7077359.bat" "C:\Users\Admin\AppData\Local\Temp\2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\2a984837bb7be00caa8937abaa695a72f507252e3ac22157bd6dcd3a4c762da1.exe"3⤵
- Views/modifies file attributes
PID:2028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5546d97f1e8a8a55884c63137e93f204e
SHA15a8a0ef154fa2e8610f905b4e17d9b3b64aed7d7
SHA2561fc0a30b510379485649c19d5dd9226c215867b8c20f23604f8c0a6e68bd39a2
SHA51232d76527c79d842bd5106b6d35dac0aa219414fa33c6613958b85b3a52d76c8b2ad5ff38cfc35c99b88a2d79e720b590e811e3a3d105fa51a858d4dffa909ccb