Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 15:03
Behavioral task
behavioral1
Sample
8a27d88aeb54b2exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8a27d88aeb54b2exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8a27d88aeb54b2exeexeexeex.exe
-
Size
73KB
-
MD5
8a27d88aeb54b266de84c3385181403f
-
SHA1
859b34d9ac366e813f044d82d1bf4d46cccee535
-
SHA256
846196f5adb6e8752f6b3899ffa59db8b16b934b3f0385fe6aa836741907f0dd
-
SHA512
53f4ce15734d531efd51cb7f2fb7d77701dd90669de803c72350037a85d775519ff393079538f2de08965e733690b7e171280c567b2e0ebcc5792ccfa860de2f
-
SSDEEP
1536:f555555555555pmgSeGDjtQhnwmmB0yl4MqqU+2bbbAV2/S2mr3IdE8mne0Avu5+:AMSjOnrmBd4MqqDL2/mr3IdE8we0Avuj
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 8a27d88aeb54b2exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ikzqchdjdty = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8a27d88aeb54b2exeexeexeex.exe" 8a27d88aeb54b2exeexeexeex.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\I: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\K: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\L: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\O: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\S: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\B: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\E: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\H: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\T: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\U: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\V: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\P: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\W: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\Z: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\M: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\N: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\Q: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\X: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\Y: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\A: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\G: 8a27d88aeb54b2exeexeexeex.exe File opened (read-only) \??\J: 8a27d88aeb54b2exeexeexeex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8a27d88aeb54b2exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8a27d88aeb54b2exeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 8a27d88aeb54b2exeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4572 8a27d88aeb54b2exeexeexeex.exe 4572 8a27d88aeb54b2exeexeexeex.exe 4572 8a27d88aeb54b2exeexeexeex.exe 4572 8a27d88aeb54b2exeexeexeex.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4572 wrote to memory of 3152 4572 8a27d88aeb54b2exeexeexeex.exe 84 PID 4572 wrote to memory of 3152 4572 8a27d88aeb54b2exeexeexeex.exe 84 PID 4572 wrote to memory of 3152 4572 8a27d88aeb54b2exeexeexeex.exe 84 PID 4572 wrote to memory of 5088 4572 8a27d88aeb54b2exeexeexeex.exe 86 PID 4572 wrote to memory of 5088 4572 8a27d88aeb54b2exeexeexeex.exe 86 PID 4572 wrote to memory of 5088 4572 8a27d88aeb54b2exeexeexeex.exe 86 PID 4572 wrote to memory of 3824 4572 8a27d88aeb54b2exeexeexeex.exe 88 PID 4572 wrote to memory of 3824 4572 8a27d88aeb54b2exeexeexeex.exe 88 PID 4572 wrote to memory of 3824 4572 8a27d88aeb54b2exeexeexeex.exe 88 PID 4572 wrote to memory of 2928 4572 8a27d88aeb54b2exeexeexeex.exe 93 PID 4572 wrote to memory of 2928 4572 8a27d88aeb54b2exeexeexeex.exe 93 PID 4572 wrote to memory of 2928 4572 8a27d88aeb54b2exeexeexeex.exe 93 PID 4572 wrote to memory of 2716 4572 8a27d88aeb54b2exeexeexeex.exe 95 PID 4572 wrote to memory of 2716 4572 8a27d88aeb54b2exeexeexeex.exe 95 PID 4572 wrote to memory of 2716 4572 8a27d88aeb54b2exeexeexeex.exe 95 PID 4572 wrote to memory of 376 4572 8a27d88aeb54b2exeexeexeex.exe 97 PID 4572 wrote to memory of 376 4572 8a27d88aeb54b2exeexeexeex.exe 97 PID 4572 wrote to memory of 376 4572 8a27d88aeb54b2exeexeexeex.exe 97 PID 4572 wrote to memory of 1988 4572 8a27d88aeb54b2exeexeexeex.exe 99 PID 4572 wrote to memory of 1988 4572 8a27d88aeb54b2exeexeexeex.exe 99 PID 4572 wrote to memory of 1988 4572 8a27d88aeb54b2exeexeexeex.exe 99 PID 4572 wrote to memory of 4244 4572 8a27d88aeb54b2exeexeexeex.exe 101 PID 4572 wrote to memory of 4244 4572 8a27d88aeb54b2exeexeexeex.exe 101 PID 4572 wrote to memory of 4244 4572 8a27d88aeb54b2exeexeexeex.exe 101 PID 4572 wrote to memory of 4240 4572 8a27d88aeb54b2exeexeexeex.exe 103 PID 4572 wrote to memory of 4240 4572 8a27d88aeb54b2exeexeexeex.exe 103 PID 4572 wrote to memory of 4240 4572 8a27d88aeb54b2exeexeexeex.exe 103 PID 4572 wrote to memory of 1052 4572 8a27d88aeb54b2exeexeexeex.exe 105 PID 4572 wrote to memory of 1052 4572 8a27d88aeb54b2exeexeexeex.exe 105 PID 4572 wrote to memory of 1052 4572 8a27d88aeb54b2exeexeexeex.exe 105 PID 4572 wrote to memory of 4800 4572 8a27d88aeb54b2exeexeexeex.exe 107 PID 4572 wrote to memory of 4800 4572 8a27d88aeb54b2exeexeexeex.exe 107 PID 4572 wrote to memory of 4800 4572 8a27d88aeb54b2exeexeexeex.exe 107 PID 4572 wrote to memory of 2188 4572 8a27d88aeb54b2exeexeexeex.exe 109 PID 4572 wrote to memory of 2188 4572 8a27d88aeb54b2exeexeexeex.exe 109 PID 4572 wrote to memory of 2188 4572 8a27d88aeb54b2exeexeexeex.exe 109 PID 4572 wrote to memory of 4344 4572 8a27d88aeb54b2exeexeexeex.exe 111 PID 4572 wrote to memory of 4344 4572 8a27d88aeb54b2exeexeexeex.exe 111 PID 4572 wrote to memory of 4344 4572 8a27d88aeb54b2exeexeexeex.exe 111 PID 4572 wrote to memory of 4956 4572 8a27d88aeb54b2exeexeexeex.exe 113 PID 4572 wrote to memory of 4956 4572 8a27d88aeb54b2exeexeexeex.exe 113 PID 4572 wrote to memory of 4956 4572 8a27d88aeb54b2exeexeexeex.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a27d88aeb54b2exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\8a27d88aeb54b2exeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3152
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:5088
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3824
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:376
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4244
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4240
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1052
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4800
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2188
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4344
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4956
-