Overview
overview
10Static
static
1PMOy4QqKcU...PF.zip
windows7-x64
1PMOy4QqKcU...PF.zip
windows10-2004-x64
11.bat
windows7-x64
11.bat
windows10-2004-x64
1detonator.cmd
windows7-x64
4detonator.cmd
windows10-2004-x64
7dqjg.ps1
windows7-x64
1dqjg.ps1
windows10-2004-x64
1dqjg.vbs
windows7-x64
1dqjg.vbs
windows10-2004-x64
3th5rk551.uku.ps1
windows7-x64
1th5rk551.uku.ps1
windows10-2004-x64
1vuso.ps1
windows7-x64
1vuso.ps1
windows10-2004-x64
10Analysis
-
max time kernel
73s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 13:17
Static task
static1
Behavioral task
behavioral1
Sample
PMOy4QqKcUIGUDxCYjsPUMTPF.zip
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
PMOy4QqKcUIGUDxCYjsPUMTPF.zip
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
1.bat
Resource
win7-20230703-en
Behavioral task
behavioral4
Sample
1.bat
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
detonator.cmd
Resource
win7-20230703-en
Behavioral task
behavioral6
Sample
detonator.cmd
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
dqjg.ps1
Resource
win7-20230703-en
Behavioral task
behavioral8
Sample
dqjg.ps1
Resource
win10v2004-20230621-en
Behavioral task
behavioral9
Sample
dqjg.vbs
Resource
win7-20230703-en
Behavioral task
behavioral10
Sample
dqjg.vbs
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
th5rk551.uku.ps1
Resource
win7-20230703-en
Behavioral task
behavioral12
Sample
th5rk551.uku.ps1
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
vuso.ps1
Resource
win7-20230703-en
General
-
Target
detonator.cmd
-
Size
1KB
-
MD5
507e4c2852dd71317e33790246598bad
-
SHA1
a662044b8240c0fb7adeb845e809417ff9ad1427
-
SHA256
a1508608b0d0990674139d4f6923d6de59838257ec0832221bb7905eb5936a7e
-
SHA512
690562314ac5a610f9df35045d214a9c65bf416b9943385f6e997022cae3b6c44a30c6d44c0cdbcb16fd4c50d676303c2c70dc4b41e0b980635a2e909c9739ff
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\sysnative\Tasks\dqjg cmd.exe File created C:\Windows\sysnative\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask cmd.exe File opened for modification C:\Windows\sysnative\Tasks\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask cmd.exe File created C:\Windows\sysnative\Tasks\dqjg cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1316 notepad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2840 3004 cmd.exe 29 PID 3004 wrote to memory of 2840 3004 cmd.exe 29 PID 3004 wrote to memory of 2840 3004 cmd.exe 29 PID 2840 wrote to memory of 1316 2840 cmd.exe 30 PID 2840 wrote to memory of 1316 2840 cmd.exe 30 PID 2840 wrote to memory of 1316 2840 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\detonator.cmd"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\cmd.execmd.exe /c "C:\ProgramData\dqjg\vuso.ps1"2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" "C:\ProgramData\dqjg\vuso.ps1"3⤵
- Opens file in notepad (likely ransom note)
PID:1316
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD507f743d7d5bff6f276abdf9c782e3f91
SHA17dd2d5f5e1a7857b7173629139a7d1916b3977b2
SHA2563aa145e796c24355657a378a74fcde3edd401736b75ec6446c085f813069c5d9
SHA512357b9da6abf72319ddd7cd917e1deb36bf149c96388cfc7500c7cf0d321aba8dfcde8fb61f66e8128b5308330f27687d60d073b236a436994b33427ef60d2490