Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
20-11-2023 14:33
Static task
static1
Behavioral task
behavioral1
Sample
AlmiqueArtilleryman_pkb3.dll
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
AlmiqueArtilleryman_pkb3.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
launcher.bat
Resource
win7-20231023-en
General
-
Target
launcher.bat
-
Size
82B
-
MD5
57a97b0b1b4d1f1418acb99e27c61423
-
SHA1
bd9a011eeaf67e32a0242675ee2214105947a408
-
SHA256
aa64b11b87f40593764f6b9a9fb2b87ab0cce1059305834862be0a5844308b7d
-
SHA512
c72c6cdd07d9ee843d2bdc7a5eb19e3c29caf2781535b6ceafcf3a0cc63ef2ca57cc26da9b9c7e6ae08e031295c9fb6651a86e7d0502715a6fbddde53417b466
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 2944 NOTEPAD.EXE 1612 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2852 1752 cmd.exe 30 PID 1752 wrote to memory of 2852 1752 cmd.exe 30 PID 1752 wrote to memory of 2852 1752 cmd.exe 30 PID 2852 wrote to memory of 1400 2852 rundll32.exe 31 PID 2852 wrote to memory of 1400 2852 rundll32.exe 31 PID 2852 wrote to memory of 1400 2852 rundll32.exe 31 PID 2852 wrote to memory of 1400 2852 rundll32.exe 31 PID 2852 wrote to memory of 1400 2852 rundll32.exe 31 PID 2852 wrote to memory of 1400 2852 rundll32.exe 31 PID 2852 wrote to memory of 1400 2852 rundll32.exe 31 PID 2504 wrote to memory of 2868 2504 cmd.exe 40 PID 2504 wrote to memory of 2868 2504 cmd.exe 40 PID 2504 wrote to memory of 2868 2504 cmd.exe 40 PID 2868 wrote to memory of 2908 2868 rundll32.exe 41 PID 2868 wrote to memory of 2908 2868 rundll32.exe 41 PID 2868 wrote to memory of 2908 2868 rundll32.exe 41 PID 2868 wrote to memory of 2908 2868 rundll32.exe 41 PID 2868 wrote to memory of 2908 2868 rundll32.exe 41 PID 2868 wrote to memory of 2908 2868 rundll32.exe 41 PID 2868 wrote to memory of 2908 2868 rundll32.exe 41
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\system32\rundll32.exerundll32.exe AlmiqueArtilleryman_pkb3.dll, Throw2⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe AlmiqueArtilleryman_pkb3.dll, Throw3⤵PID:1400
-
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵PID:2648
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\launcher.bat1⤵
- Opens file in notepad (likely ransom note)
PID:2944
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\launcher.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\rundll32.exerundll32.exe AlmiqueArtilleryman_pkb3.dll, Throw2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe AlmiqueArtilleryman_pkb3.dll, Throw3⤵PID:2908
-
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\launcher.bat1⤵
- Opens file in notepad (likely ransom note)
PID:1612
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\launcher.bat" "1⤵PID:2788
-
C:\Windows\system32\rundll32.exerundll32.exe AlmiqueArtilleryman_pkb3.dll, Throw2⤵PID:2772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe AlmiqueArtilleryman_pkb3.dll, Throw3⤵PID:1976
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88B
MD52f1086d62e79ba2fc3d9206e9c9a7325
SHA11392cd1561ba5b6e4c5714872e39c8c5dc9dfcda
SHA256773478dde6b5d1b913faf422164d81327529a39f126a846880071f2c06fd8b9f
SHA512ca40a58db2a564d578c88fc66600dcef6dcda2cf0887580aa006573558438e85187863e22c9226b68934ccbb985a83574d95a6c122a6c7d3f9bb0f5eed4004ed
-
Filesize
88B
MD52f1086d62e79ba2fc3d9206e9c9a7325
SHA11392cd1561ba5b6e4c5714872e39c8c5dc9dfcda
SHA256773478dde6b5d1b913faf422164d81327529a39f126a846880071f2c06fd8b9f
SHA512ca40a58db2a564d578c88fc66600dcef6dcda2cf0887580aa006573558438e85187863e22c9226b68934ccbb985a83574d95a6c122a6c7d3f9bb0f5eed4004ed