Analysis
-
max time kernel
117s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 00:08
Static task
static1
Behavioral task
behavioral1
Sample
212207f5a1eb39c861ff8b080ddcd2ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
212207f5a1eb39c861ff8b080ddcd2ef.exe
Resource
win10v2004-20231215-en
General
-
Target
212207f5a1eb39c861ff8b080ddcd2ef.exe
-
Size
3.6MB
-
MD5
212207f5a1eb39c861ff8b080ddcd2ef
-
SHA1
4613aa3cba20966b5ce95918893df9e5053d206d
-
SHA256
cd9c6bafeef092b670ea307caf9cd2aeb234e5232950be1181f24ab41a26a4d1
-
SHA512
0b341c34f0590e4a4dccc1100db2f83b63241bd8fb8f95a8185fa303a24fa53270a3ab76de5d7f22260545a84ec262c218f2e2ba89f660396c3b837df3b8eaed
-
SSDEEP
98304:aYhWM7csQQNHTdcf5KsQFHxmKUhgggggggWGqS9xkuDQZt/:aPMfzBdcU7FRahggggggg8S9xgZ9
Malware Config
Signatures
-
Ekans
Variant of Snake Ransomware. Targets ICS infrastructure, known to have been used against Honda in June 2020.
-
Ekans Ransomware 2 IoCs
Executable looks like Ekans ICS ransomware sample.
resource yara_rule behavioral1/files/0x000b000000014ac6-2.dat family_ekans behavioral1/files/0x000b000000014ac6-8.dat family_ekans -
Zebrocy Go Variant 2 IoCs
resource yara_rule behavioral1/files/0x000b000000014ac6-2.dat Zebrocy behavioral1/files/0x000b000000014ac6-8.dat Zebrocy -
Executes dropped EXE 1 IoCs
pid Process 2720 1.exe -
Loads dropped DLL 5 IoCs
pid Process 2756 212207f5a1eb39c861ff8b080ddcd2ef.exe 2756 212207f5a1eb39c861ff8b080ddcd2ef.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2936 2720 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2720 2756 212207f5a1eb39c861ff8b080ddcd2ef.exe 29 PID 2756 wrote to memory of 2720 2756 212207f5a1eb39c861ff8b080ddcd2ef.exe 29 PID 2756 wrote to memory of 2720 2756 212207f5a1eb39c861ff8b080ddcd2ef.exe 29 PID 2756 wrote to memory of 2720 2756 212207f5a1eb39c861ff8b080ddcd2ef.exe 29 PID 2720 wrote to memory of 2936 2720 1.exe 31 PID 2720 wrote to memory of 2936 2720 1.exe 31 PID 2720 wrote to memory of 2936 2720 1.exe 31 PID 2720 wrote to memory of 2936 2720 1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\212207f5a1eb39c861ff8b080ddcd2ef.exe"C:\Users\Admin\AppData\Local\Temp\212207f5a1eb39c861ff8b080ddcd2ef.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\1.exe1.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 1043⤵
- Loads dropped DLL
- Program crash
PID:2936
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5db7e4acad8745252387031ff485571c7
SHA16f5cbd0321b9095f61a3a27e46a1b5f5a3867e7b
SHA256d66cb6435f78f941125cc790e70732c5156d9ed3ddd78bf06e146b9f0ae440de
SHA512eed0b04cdd76c674f23b9ab2ffee6d9c23b27008daefc1059c2f8e9fb2a6bd6f344ba2a1c0749c3548f3d3e9d4692596ac92b80020c808ffb9e3540d985beb1e
-
Filesize
3.6MB
MD53168f4d5cdc232eb6d65f5f2af9c249a
SHA1caa8bc43ae9263acb1ab8bbbe2aca1b79b03cfb8
SHA256d39e39d1cab8ed9295f52256df1229997d1f27c7c71939eb29b79cb329a73dc6
SHA512851f969a13eddbf8a58ab41c4f970f0318499e86ff07b9e8b78bc281f00b4ebf76edb55f7d0e1962b230966c2c29f75a97bc7cc3031330b5185e5362732a02c6