Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 11:13
Behavioral task
behavioral1
Sample
9522a237c88d43exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9522a237c88d43exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
9522a237c88d43exeexeexeex.exe
-
Size
73KB
-
MD5
9522a237c88d43ea6d7c7bb816c22374
-
SHA1
6bd10a141932b66e5edc19457afa595ec035034f
-
SHA256
aedd68bf60a9da51012e764594cef67b29ead52dbf97d359bfa8bd7c86a75ea2
-
SHA512
f1ae04ce3aa49427fc518f87c313b0e1f958d186520166f70b383b5e94bfe31b435bcce1c3a43ff1ecbefbff4b6911d4a3d0526d62ecac161efb2ff6dde6142d
-
SSDEEP
1536:+55u555555555pmgSeGDjtQhnwmmB0ybMqqU+2bbbAV2/S2mr3IdE8mne0Avu5rJ:UMSjOnrmBTMqqDL2/mr3IdE8we0Avu5h
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 9522a237c88d43exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ivjepegxprf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9522a237c88d43exeexeexeex.exe" 9522a237c88d43exeexeexeex.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\G: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\H: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\J: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\O: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\R: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\L: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\P: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\Q: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\S: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\W: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\Z: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\N: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\T: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\U: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\V: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\X: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\Y: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\B: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\E: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\I: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\K: 9522a237c88d43exeexeexeex.exe File opened (read-only) \??\M: 9522a237c88d43exeexeexeex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9522a237c88d43exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9522a237c88d43exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 9522a237c88d43exeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4432 9522a237c88d43exeexeexeex.exe 4432 9522a237c88d43exeexeexeex.exe 4432 9522a237c88d43exeexeexeex.exe 4432 9522a237c88d43exeexeexeex.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4528 4432 9522a237c88d43exeexeexeex.exe 85 PID 4432 wrote to memory of 4528 4432 9522a237c88d43exeexeexeex.exe 85 PID 4432 wrote to memory of 4528 4432 9522a237c88d43exeexeexeex.exe 85 PID 4432 wrote to memory of 4752 4432 9522a237c88d43exeexeexeex.exe 87 PID 4432 wrote to memory of 4752 4432 9522a237c88d43exeexeexeex.exe 87 PID 4432 wrote to memory of 4752 4432 9522a237c88d43exeexeexeex.exe 87 PID 4432 wrote to memory of 4572 4432 9522a237c88d43exeexeexeex.exe 89 PID 4432 wrote to memory of 4572 4432 9522a237c88d43exeexeexeex.exe 89 PID 4432 wrote to memory of 4572 4432 9522a237c88d43exeexeexeex.exe 89 PID 4432 wrote to memory of 1636 4432 9522a237c88d43exeexeexeex.exe 93 PID 4432 wrote to memory of 1636 4432 9522a237c88d43exeexeexeex.exe 93 PID 4432 wrote to memory of 1636 4432 9522a237c88d43exeexeexeex.exe 93 PID 4432 wrote to memory of 4772 4432 9522a237c88d43exeexeexeex.exe 96 PID 4432 wrote to memory of 4772 4432 9522a237c88d43exeexeexeex.exe 96 PID 4432 wrote to memory of 4772 4432 9522a237c88d43exeexeexeex.exe 96 PID 4432 wrote to memory of 5048 4432 9522a237c88d43exeexeexeex.exe 98 PID 4432 wrote to memory of 5048 4432 9522a237c88d43exeexeexeex.exe 98 PID 4432 wrote to memory of 5048 4432 9522a237c88d43exeexeexeex.exe 98 PID 4432 wrote to memory of 3940 4432 9522a237c88d43exeexeexeex.exe 100 PID 4432 wrote to memory of 3940 4432 9522a237c88d43exeexeexeex.exe 100 PID 4432 wrote to memory of 3940 4432 9522a237c88d43exeexeexeex.exe 100 PID 4432 wrote to memory of 1820 4432 9522a237c88d43exeexeexeex.exe 102 PID 4432 wrote to memory of 1820 4432 9522a237c88d43exeexeexeex.exe 102 PID 4432 wrote to memory of 1820 4432 9522a237c88d43exeexeexeex.exe 102 PID 4432 wrote to memory of 1744 4432 9522a237c88d43exeexeexeex.exe 104 PID 4432 wrote to memory of 1744 4432 9522a237c88d43exeexeexeex.exe 104 PID 4432 wrote to memory of 1744 4432 9522a237c88d43exeexeexeex.exe 104 PID 4432 wrote to memory of 4108 4432 9522a237c88d43exeexeexeex.exe 106 PID 4432 wrote to memory of 4108 4432 9522a237c88d43exeexeexeex.exe 106 PID 4432 wrote to memory of 4108 4432 9522a237c88d43exeexeexeex.exe 106 PID 4432 wrote to memory of 1692 4432 9522a237c88d43exeexeexeex.exe 108 PID 4432 wrote to memory of 1692 4432 9522a237c88d43exeexeexeex.exe 108 PID 4432 wrote to memory of 1692 4432 9522a237c88d43exeexeexeex.exe 108 PID 4432 wrote to memory of 4944 4432 9522a237c88d43exeexeexeex.exe 110 PID 4432 wrote to memory of 4944 4432 9522a237c88d43exeexeexeex.exe 110 PID 4432 wrote to memory of 4944 4432 9522a237c88d43exeexeexeex.exe 110 PID 4432 wrote to memory of 4900 4432 9522a237c88d43exeexeexeex.exe 112 PID 4432 wrote to memory of 4900 4432 9522a237c88d43exeexeexeex.exe 112 PID 4432 wrote to memory of 4900 4432 9522a237c88d43exeexeexeex.exe 112 PID 4432 wrote to memory of 1480 4432 9522a237c88d43exeexeexeex.exe 114 PID 4432 wrote to memory of 1480 4432 9522a237c88d43exeexeexeex.exe 114 PID 4432 wrote to memory of 1480 4432 9522a237c88d43exeexeexeex.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\9522a237c88d43exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\9522a237c88d43exeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4752
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4572
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1636
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4772
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:5048
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1744
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4108
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4944
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4900
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1480
-