Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2023 23:48
Static task
static1
Behavioral task
behavioral1
Sample
6b313a2cd142a85fb482afa7a0bd7834.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6b313a2cd142a85fb482afa7a0bd7834.exe
Resource
win10v2004-20220812-en
General
-
Target
6b313a2cd142a85fb482afa7a0bd7834.exe
-
Size
325KB
-
MD5
6b313a2cd142a85fb482afa7a0bd7834
-
SHA1
8d74e31351b6efe3fdeb5a568fbb3144578ba19b
-
SHA256
93b2804de9aa165857fdc21c9c6512c5d3a2308d29441f0015d4ac700c95f25e
-
SHA512
97f226fe6379ab6936cb83ba2d3c54b8c150d3405150c3b48bba7ea6068d42910cd5ff755a093ccb1611d9027624fb5145b0654673234f8df4b57c60de037b6c
-
SSDEEP
3072:JYjClDhQlDvrcHxKp6ga1DdkJT2JQlmeIf8RQ1P7qSTMep9NO:JDOexI6hI2YmURoDrMep9NO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3400 setup.exe -
Loads dropped DLL 3 IoCs
pid Process 4992 6b313a2cd142a85fb482afa7a0bd7834.exe 4992 6b313a2cd142a85fb482afa7a0bd7834.exe 4992 6b313a2cd142a85fb482afa7a0bd7834.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4992 wrote to memory of 3400 4992 6b313a2cd142a85fb482afa7a0bd7834.exe 80 PID 4992 wrote to memory of 3400 4992 6b313a2cd142a85fb482afa7a0bd7834.exe 80 PID 4992 wrote to memory of 3400 4992 6b313a2cd142a85fb482afa7a0bd7834.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b313a2cd142a85fb482afa7a0bd7834.exe"C:\Users\Admin\AppData\Local\Temp\6b313a2cd142a85fb482afa7a0bd7834.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\nsk6E7F.tmp\setup.exeC:\Users\Admin\AppData\Local\Temp\nsk6E7F.tmp\setup.exe2⤵
- Executes dropped EXE
PID:3400
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5b0c77267f13b2f87c084fd86ef51ccfc
SHA1f7543f9e9b4f04386dfbf33c38cbed1bf205afb3
SHA256a0cac4cf4852895619bc7743ebeb89f9e4927ccdb9e66b1bcd92a4136d0f9c77
SHA512f2b57a2eea00f52a3c7080f4b5f2bb85a7a9b9f16d12da8f8ff673824556c62a0f742b72be0fd82a2612a4b6dbd7e0fdc27065212da703c2f7e28d199696f66e
-
Filesize
14KB
MD5a95c7af96416b2cd084fed4c07c8c291
SHA10c62c2fd843ccb59784404ed36369784dc557671
SHA256a1e09fb1739ef7557d18104b0d6a4c7725e1ec293f5404c80402f57ff9ebb9d0
SHA512427ef14b116b574c5558cc6bb0ce03ab37f891f2d7ab0f130e3cddd0265e6bd269c598ce93230e56cd41bb9d2649bbbaa2fa2c654d8116c0c6f79a6f3419d1dc
-
Filesize
14KB
MD5a95c7af96416b2cd084fed4c07c8c291
SHA10c62c2fd843ccb59784404ed36369784dc557671
SHA256a1e09fb1739ef7557d18104b0d6a4c7725e1ec293f5404c80402f57ff9ebb9d0
SHA512427ef14b116b574c5558cc6bb0ce03ab37f891f2d7ab0f130e3cddd0265e6bd269c598ce93230e56cd41bb9d2649bbbaa2fa2c654d8116c0c6f79a6f3419d1dc
-
Filesize
90KB
MD5df1267ad2fb2e87a89609ead6810f612
SHA1c36b8366158b48bf9169b710650291a0914ed262
SHA256f03ba3740dd481ff4ed1cf7bc2c2edb2bbfe5bea1edfc0435bc26124d4c455e6
SHA5124a3695349ae5bf1a045e3fd52359765781a15b0e4631f53119cfe8a04bf461e6d74e5228ea2e12e3760227e651db490d8c7a6acefef1d4bdd86c16fa4fd563a7
-
Filesize
90KB
MD5df1267ad2fb2e87a89609ead6810f612
SHA1c36b8366158b48bf9169b710650291a0914ed262
SHA256f03ba3740dd481ff4ed1cf7bc2c2edb2bbfe5bea1edfc0435bc26124d4c455e6
SHA5124a3695349ae5bf1a045e3fd52359765781a15b0e4631f53119cfe8a04bf461e6d74e5228ea2e12e3760227e651db490d8c7a6acefef1d4bdd86c16fa4fd563a7