Analysis
-
max time kernel
58s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14/02/2023, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF DUE.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
STATEMENT OF DUE.exe
Resource
win10v2004-20221111-en
General
-
Target
STATEMENT OF DUE.exe
-
Size
479KB
-
MD5
f887d56a8c442677fa724d3faf86aafe
-
SHA1
f87552c2cb912299fce50b1f5e3a09dacfdb1f79
-
SHA256
322eb06a1c789fa91c8e5e9aaaae961552669ae055606e7b8be8cc31dcf0dce7
-
SHA512
c18e0183f7d3725dfccc9c45818e4e36dd657d3bae9144298d7c05eec22d819410c264864ced9f608afb12f4ff20f5b053e36cf6a320d2f779e2679826e163c0
-
SSDEEP
12288:RYWJFILPzIfF78f/EHBE6Zop+vq5BTRDchmjVdc:RYW43I978EHB9IBTRc
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 952 lrcprhadjb.exe 748 lrcprhadjb.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 STATEMENT OF DUE.exe 952 lrcprhadjb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\kswu = "C:\\Users\\Admin\\AppData\\Roaming\\mwwhvgmcuk\\fsnivb.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\lrcprhadjb.exe\" C:\\Users\\Admin\\AppData\\Loc" lrcprhadjb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 952 set thread context of 748 952 lrcprhadjb.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 748 lrcprhadjb.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 952 lrcprhadjb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 748 lrcprhadjb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2024 wrote to memory of 952 2024 STATEMENT OF DUE.exe 28 PID 2024 wrote to memory of 952 2024 STATEMENT OF DUE.exe 28 PID 2024 wrote to memory of 952 2024 STATEMENT OF DUE.exe 28 PID 2024 wrote to memory of 952 2024 STATEMENT OF DUE.exe 28 PID 952 wrote to memory of 748 952 lrcprhadjb.exe 30 PID 952 wrote to memory of 748 952 lrcprhadjb.exe 30 PID 952 wrote to memory of 748 952 lrcprhadjb.exe 30 PID 952 wrote to memory of 748 952 lrcprhadjb.exe 30 PID 952 wrote to memory of 748 952 lrcprhadjb.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF DUE.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF DUE.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\lrcprhadjb.exe"C:\Users\Admin\AppData\Local\Temp\lrcprhadjb.exe" C:\Users\Admin\AppData\Local\Temp\pubpld.pdm2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\lrcprhadjb.exe"C:\Users\Admin\AppData\Local\Temp\lrcprhadjb.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5e97a4aed3ff2f402aa6ccb11033ab677
SHA1ce38b1b50a0df62d661dafdc80e471042210b6d5
SHA256389394f70453eb013526ff29a4e1eafcfc2fa9ef7f63218a6a81653efb634b9d
SHA51203aae58755d5399382968ad56a2b18c5f8e74911bc6cf16d4cf0c38a92ee6e861d5eeb11475de4dcc9c0ef1153ab951a139eac2a6ceba663a4bfa82e9e142991
-
Filesize
91KB
MD5903b145ec9a8464a3727a08a58e25330
SHA19085599c02657d52123fe0635ffe9ef303b01339
SHA256dc5221657dfb6a7ff6e086114851ae1b161876555c76638c12ea2da6814b6c92
SHA512fcfafddd199802dbcf5d4bb235898326de5a0fbfd1dae5386abd22cf8ac07848085b1e765ee43800a046e212f2f48685a608b0d316c6c4bd59a8f252aa5419bc
-
Filesize
91KB
MD5903b145ec9a8464a3727a08a58e25330
SHA19085599c02657d52123fe0635ffe9ef303b01339
SHA256dc5221657dfb6a7ff6e086114851ae1b161876555c76638c12ea2da6814b6c92
SHA512fcfafddd199802dbcf5d4bb235898326de5a0fbfd1dae5386abd22cf8ac07848085b1e765ee43800a046e212f2f48685a608b0d316c6c4bd59a8f252aa5419bc
-
Filesize
91KB
MD5903b145ec9a8464a3727a08a58e25330
SHA19085599c02657d52123fe0635ffe9ef303b01339
SHA256dc5221657dfb6a7ff6e086114851ae1b161876555c76638c12ea2da6814b6c92
SHA512fcfafddd199802dbcf5d4bb235898326de5a0fbfd1dae5386abd22cf8ac07848085b1e765ee43800a046e212f2f48685a608b0d316c6c4bd59a8f252aa5419bc
-
Filesize
7KB
MD59de92bd9728ed0b01663b2fce5d39559
SHA102e44c240fc37f55ffd40bedd917ced9ded4f691
SHA256a52e9824a17b5746c5fcd0c231fd106baf7f7ac96178331a7fcf5a46eeb17747
SHA5127b1b0d0863810800fe81fa3ea60dbe01815f44efc288a04efb6227a4cd7533b04994c183a3e31f7056773624b76de449bfc7ebbe5437e3de06fe5658dd8c7562
-
Filesize
91KB
MD5903b145ec9a8464a3727a08a58e25330
SHA19085599c02657d52123fe0635ffe9ef303b01339
SHA256dc5221657dfb6a7ff6e086114851ae1b161876555c76638c12ea2da6814b6c92
SHA512fcfafddd199802dbcf5d4bb235898326de5a0fbfd1dae5386abd22cf8ac07848085b1e765ee43800a046e212f2f48685a608b0d316c6c4bd59a8f252aa5419bc
-
Filesize
91KB
MD5903b145ec9a8464a3727a08a58e25330
SHA19085599c02657d52123fe0635ffe9ef303b01339
SHA256dc5221657dfb6a7ff6e086114851ae1b161876555c76638c12ea2da6814b6c92
SHA512fcfafddd199802dbcf5d4bb235898326de5a0fbfd1dae5386abd22cf8ac07848085b1e765ee43800a046e212f2f48685a608b0d316c6c4bd59a8f252aa5419bc