Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2023 18:16
Behavioral task
behavioral1
Sample
902d3e298d0afaexeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
902d3e298d0afaexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
902d3e298d0afaexeexeexeex.exe
-
Size
73KB
-
MD5
902d3e298d0afa25ef3a46720fa0f15a
-
SHA1
8a4d107fed4a16e97e355097bd5ed9bcdd710bdd
-
SHA256
d643955488941c2ff39fe6ae12f582b36d68220d533702e016609f3f6b1533fe
-
SHA512
8f542f81bddb2ccf3220508b487f3a5a8dafa55a76bb6c453d4c559a6d91faddb930fd66384d54b4f8510aa543becf26550a32f60f595da5ac003775a1071dbe
-
SSDEEP
1536:sgSeGDjtQhnwmmB0yjMqqUM2mr3IdE8mne0Avu5r++yy7CA7GcIaapavdv:sMSjOnrmBbMqqMmr3IdE8we0Avu5r++N
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 902d3e298d0afaexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\eiwxgdiiqsr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\902d3e298d0afaexeexeexeex.exe" 902d3e298d0afaexeexeexeex.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\Y: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\Z: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\E: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\I: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\J: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\L: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\N: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\B: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\T: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\X: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\S: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\U: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\W: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\A: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\H: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\K: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\M: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\O: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\G: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\Q: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\R: 902d3e298d0afaexeexeexeex.exe File opened (read-only) \??\V: 902d3e298d0afaexeexeexeex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 902d3e298d0afaexeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 902d3e298d0afaexeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 902d3e298d0afaexeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1848 902d3e298d0afaexeexeexeex.exe 1848 902d3e298d0afaexeexeexeex.exe 1848 902d3e298d0afaexeexeexeex.exe 1848 902d3e298d0afaexeexeexeex.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1264 1848 902d3e298d0afaexeexeexeex.exe 86 PID 1848 wrote to memory of 1264 1848 902d3e298d0afaexeexeexeex.exe 86 PID 1848 wrote to memory of 1264 1848 902d3e298d0afaexeexeexeex.exe 86 PID 1848 wrote to memory of 3200 1848 902d3e298d0afaexeexeexeex.exe 90 PID 1848 wrote to memory of 3200 1848 902d3e298d0afaexeexeexeex.exe 90 PID 1848 wrote to memory of 3200 1848 902d3e298d0afaexeexeexeex.exe 90 PID 1848 wrote to memory of 3680 1848 902d3e298d0afaexeexeexeex.exe 92 PID 1848 wrote to memory of 3680 1848 902d3e298d0afaexeexeexeex.exe 92 PID 1848 wrote to memory of 3680 1848 902d3e298d0afaexeexeexeex.exe 92 PID 1848 wrote to memory of 3352 1848 902d3e298d0afaexeexeexeex.exe 99 PID 1848 wrote to memory of 3352 1848 902d3e298d0afaexeexeexeex.exe 99 PID 1848 wrote to memory of 3352 1848 902d3e298d0afaexeexeexeex.exe 99 PID 1848 wrote to memory of 764 1848 902d3e298d0afaexeexeexeex.exe 101 PID 1848 wrote to memory of 764 1848 902d3e298d0afaexeexeexeex.exe 101 PID 1848 wrote to memory of 764 1848 902d3e298d0afaexeexeexeex.exe 101 PID 1848 wrote to memory of 3700 1848 902d3e298d0afaexeexeexeex.exe 103 PID 1848 wrote to memory of 3700 1848 902d3e298d0afaexeexeexeex.exe 103 PID 1848 wrote to memory of 3700 1848 902d3e298d0afaexeexeexeex.exe 103 PID 1848 wrote to memory of 940 1848 902d3e298d0afaexeexeexeex.exe 105 PID 1848 wrote to memory of 940 1848 902d3e298d0afaexeexeexeex.exe 105 PID 1848 wrote to memory of 940 1848 902d3e298d0afaexeexeexeex.exe 105 PID 1848 wrote to memory of 3576 1848 902d3e298d0afaexeexeexeex.exe 107 PID 1848 wrote to memory of 3576 1848 902d3e298d0afaexeexeexeex.exe 107 PID 1848 wrote to memory of 3576 1848 902d3e298d0afaexeexeexeex.exe 107 PID 1848 wrote to memory of 3804 1848 902d3e298d0afaexeexeexeex.exe 109 PID 1848 wrote to memory of 3804 1848 902d3e298d0afaexeexeexeex.exe 109 PID 1848 wrote to memory of 3804 1848 902d3e298d0afaexeexeexeex.exe 109 PID 1848 wrote to memory of 4524 1848 902d3e298d0afaexeexeexeex.exe 111 PID 1848 wrote to memory of 4524 1848 902d3e298d0afaexeexeexeex.exe 111 PID 1848 wrote to memory of 4524 1848 902d3e298d0afaexeexeexeex.exe 111 PID 1848 wrote to memory of 4544 1848 902d3e298d0afaexeexeexeex.exe 113 PID 1848 wrote to memory of 4544 1848 902d3e298d0afaexeexeexeex.exe 113 PID 1848 wrote to memory of 4544 1848 902d3e298d0afaexeexeexeex.exe 113 PID 1848 wrote to memory of 3464 1848 902d3e298d0afaexeexeexeex.exe 115 PID 1848 wrote to memory of 3464 1848 902d3e298d0afaexeexeexeex.exe 115 PID 1848 wrote to memory of 3464 1848 902d3e298d0afaexeexeexeex.exe 115 PID 1848 wrote to memory of 4248 1848 902d3e298d0afaexeexeexeex.exe 119 PID 1848 wrote to memory of 4248 1848 902d3e298d0afaexeexeexeex.exe 119 PID 1848 wrote to memory of 4248 1848 902d3e298d0afaexeexeexeex.exe 119 PID 1848 wrote to memory of 2588 1848 902d3e298d0afaexeexeexeex.exe 121 PID 1848 wrote to memory of 2588 1848 902d3e298d0afaexeexeexeex.exe 121 PID 1848 wrote to memory of 2588 1848 902d3e298d0afaexeexeexeex.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\902d3e298d0afaexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\902d3e298d0afaexeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1264
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:3200
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3680
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3352
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:764
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3700
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:3576
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3804
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4524
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4544
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3464
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4248
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2588
-