Analysis
-
max time kernel
33s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31/01/2023, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
Mirillis Action! By Maykerstar Games.rar
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Mirillis Action! By Maykerstar Games.rar
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Mirillis Action!/CRACK/Action_Loader.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Mirillis Action!/CRACK/Action_Loader.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Mirillis Action!/Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Mirillis Action!/Setup.exe
Resource
win10v2004-20220812-en
General
-
Target
Mirillis Action!/Setup.exe
-
Size
105.8MB
-
MD5
919960e54a9f254e3c69d662ab8fe4a3
-
SHA1
eb160dca4bda8d7e80061dfff24adb6e6f07b73b
-
SHA256
2a578e10fe4deddfd9e138e7b72cb4eba9d6951459b07397618622afd68289c0
-
SHA512
b076e2df0d506acc1512941901c16f4ae6135e7d71cc81310a3a1d0e5a3204049d83dcf4acc9b477e207302453b9e0ad2e101bef8edcc8924266ac84916c65dc
-
SSDEEP
3145728:sm6VEt+IgHZ5yfF6UBgUaMZn7UC19BzmwN:sQt/w5wfa+PVt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1272 action_setup.exe -
Loads dropped DLL 8 IoCs
pid Process 1032 Setup.exe 1032 Setup.exe 1032 Setup.exe 1032 Setup.exe 1272 action_setup.exe 1272 action_setup.exe 1272 action_setup.exe 1272 action_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1272 1032 Setup.exe 27 PID 1032 wrote to memory of 1272 1032 Setup.exe 27 PID 1032 wrote to memory of 1272 1032 Setup.exe 27 PID 1032 wrote to memory of 1272 1032 Setup.exe 27 PID 1032 wrote to memory of 1272 1032 Setup.exe 27 PID 1032 wrote to memory of 1272 1032 Setup.exe 27 PID 1032 wrote to memory of 1272 1032 Setup.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mirillis Action!\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Mirillis Action!\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\action_setup.exe"C:\Users\Admin\AppData\Local\Temp\action_setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103.8MB
MD5afe5386fb2601106c6262b9ab1d2178d
SHA1a532a3c0946f5939c8326992e800e056e80426e8
SHA256553fd0a5dce585787c5ee0c653f96d5ef9d01e435e5d91602e2831267870b0c6
SHA5128076791bd5d3c0d258c907283782ae77bc6d96ddb7a526f6a150cdc9b8dfe13434bbb4b6c98bf8dd74f9429990efb132f8dc9f3456e7b207efaf2cfdb7bafdf6
-
Filesize
103.8MB
MD5afe5386fb2601106c6262b9ab1d2178d
SHA1a532a3c0946f5939c8326992e800e056e80426e8
SHA256553fd0a5dce585787c5ee0c653f96d5ef9d01e435e5d91602e2831267870b0c6
SHA5128076791bd5d3c0d258c907283782ae77bc6d96ddb7a526f6a150cdc9b8dfe13434bbb4b6c98bf8dd74f9429990efb132f8dc9f3456e7b207efaf2cfdb7bafdf6
-
Filesize
103.8MB
MD5afe5386fb2601106c6262b9ab1d2178d
SHA1a532a3c0946f5939c8326992e800e056e80426e8
SHA256553fd0a5dce585787c5ee0c653f96d5ef9d01e435e5d91602e2831267870b0c6
SHA5128076791bd5d3c0d258c907283782ae77bc6d96ddb7a526f6a150cdc9b8dfe13434bbb4b6c98bf8dd74f9429990efb132f8dc9f3456e7b207efaf2cfdb7bafdf6
-
Filesize
103.8MB
MD5afe5386fb2601106c6262b9ab1d2178d
SHA1a532a3c0946f5939c8326992e800e056e80426e8
SHA256553fd0a5dce585787c5ee0c653f96d5ef9d01e435e5d91602e2831267870b0c6
SHA5128076791bd5d3c0d258c907283782ae77bc6d96ddb7a526f6a150cdc9b8dfe13434bbb4b6c98bf8dd74f9429990efb132f8dc9f3456e7b207efaf2cfdb7bafdf6
-
Filesize
103.8MB
MD5afe5386fb2601106c6262b9ab1d2178d
SHA1a532a3c0946f5939c8326992e800e056e80426e8
SHA256553fd0a5dce585787c5ee0c653f96d5ef9d01e435e5d91602e2831267870b0c6
SHA5128076791bd5d3c0d258c907283782ae77bc6d96ddb7a526f6a150cdc9b8dfe13434bbb4b6c98bf8dd74f9429990efb132f8dc9f3456e7b207efaf2cfdb7bafdf6
-
Filesize
103.8MB
MD5afe5386fb2601106c6262b9ab1d2178d
SHA1a532a3c0946f5939c8326992e800e056e80426e8
SHA256553fd0a5dce585787c5ee0c653f96d5ef9d01e435e5d91602e2831267870b0c6
SHA5128076791bd5d3c0d258c907283782ae77bc6d96ddb7a526f6a150cdc9b8dfe13434bbb4b6c98bf8dd74f9429990efb132f8dc9f3456e7b207efaf2cfdb7bafdf6
-
Filesize
292KB
MD5b32d5a2a5018293cefbebcabe7c54fb9
SHA1365517d481172f946109a963956ea2a070b697cd
SHA256f90863383c79af5e3c7969adc24320156651d3443ec63679c986b2ebbe78af8e
SHA512c50ade226238ab052a08843dfd1cce3496cbd973f1cd5d775f32f5670529897ba5845981d4772671f7b2b77e23ad6a935f3f48d363fceea31bb89e5a4781480f
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
4KB
MD5c7ce0e47c83525983fd2c4c9566b4aad
SHA138b7ad7bb32ffae35540fce373b8a671878dc54e
SHA2566293408a5fa6d0f55f0a4d01528eb5b807ee9447a75a28b5986267475ebcd3ae
SHA512ee9f23ea5210f418d4c559628bbfb3a0f892440bcd5dc4c1901cb8e510078e4481ea8353b262795076a19055e70b88e08fee5fb7e8f35a6f49022096408df20e
-
Filesize
9KB
MD54ccc4a742d4423f2f0ed744fd9c81f63
SHA1704f00a1acc327fd879cf75fc90d0b8f927c36bc
SHA256416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6
SHA512790c5eb1f8b297e45054c855b66dfc18e9f3f1b1870559014dbefa3b9d5b6d33a993a9e089202e70f51a55d859b74e8605c6f633386fd9189b6f78941bf1bfdb