Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 09:40
Static task
static1
Behavioral task
behavioral1
Sample
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe
Resource
win7-20240221-en
General
-
Target
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe
-
Size
7.1MB
-
MD5
e019295a44882db3321c692f7d818b8b
-
SHA1
2c5f371ac5db8062b876571d20398c60b0b0f584
-
SHA256
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86
-
SHA512
002fb6d60a3c8874c7e257cdb174928cd908223bc3fb553cd9fd6506bfc91b6cb45fdc2909fb069fad9b4a75fefbde3addeacc444bc76f25e47fe560925be4e6
-
SSDEEP
98304:hwdhBkGMb188jaz+2RYKNpYzp5jsvYjJ+tSfby2N/lZU5V1FXwOoopC+2UOZ:f88Oz8hro8+tkt/lZaloopC+
Malware Config
Signatures
-
Detected Ploutus loader 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2884-13-0x00000000001E0000-0x00000000006B8000-memory.dmp family_ploutus behavioral1/memory/2884-14-0x00000000001E0000-0x00000000006B8000-memory.dmp family_ploutus -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
GruqyKY0Fr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GruqyKY0Fr.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
GruqyKY0Fr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GruqyKY0Fr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GruqyKY0Fr.exe -
Executes dropped EXE 1 IoCs
Processes:
GruqyKY0Fr.exepid process 2884 GruqyKY0Fr.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
GruqyKY0Fr.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Wine GruqyKY0Fr.exe -
Loads dropped DLL 1 IoCs
Processes:
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exepid process 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2556 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exedescription pid process target process PID 1764 wrote to memory of 2884 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe GruqyKY0Fr.exe PID 1764 wrote to memory of 2884 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe GruqyKY0Fr.exe PID 1764 wrote to memory of 2884 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe GruqyKY0Fr.exe PID 1764 wrote to memory of 2884 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe GruqyKY0Fr.exe PID 1764 wrote to memory of 2556 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe NOTEPAD.EXE PID 1764 wrote to memory of 2556 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe NOTEPAD.EXE PID 1764 wrote to memory of 2556 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe NOTEPAD.EXE PID 1764 wrote to memory of 2556 1764 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe"C:\Users\Admin\AppData\Local\Temp\7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\GruqyKY0Fr.exe"C:\Users\Admin\AppData\Local\Temp\GruqyKY0Fr.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\EXvr2NPzlX.txt2⤵
- Opens file in notepad (likely ransom note)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\EXvr2NPzlX.txtFilesize
51B
MD51322ceb566e06ea83fd534fa84b5bb9e
SHA1e87d32b26005d5183b2acd5d9fecd308f95fe3dc
SHA25653b9bf5b5a207cdfe0e468e0853e8eec1ba7d1e98d4efb4c19cd8b9ce70bacb8
SHA512919e8782a0d1ea233061def068e00a21ae4c5f8c4d01fc9b32c828af797804c8cee09707847a6781b0616d3156d55e188cee6427200c4e627a2ae2bf8564851e
-
C:\Users\Admin\AppData\Local\Temp\GruqyKY0Fr.exeFilesize
4.8MB
MD580b4d6f1da00532cbbc22bfc1411ecc6
SHA1022f9f1659645448d852218d046923a7b79a25b4
SHA256a3dd1fee47ec9a9a72283e47b095e67eeb1ec0d7e9df82bc1004bb788b331020
SHA5127bdc622e9806700928ecf3c64ac9e3bc56f0c2a443222f9646fb81db8cbf33b351ad832866501f17f9ad799348396a703ae8c9cb2a2ec7584305efc76c22ac82
-
\Users\Admin\AppData\Local\Temp\GruqyKY0Fr.exeFilesize
4.0MB
MD59b9647d41ac969b26862a99b36514795
SHA1ee51297c6556b22edca429cbeec7e4fac7c3ccd5
SHA256f04b1fd404c310eca4628c307eda07240ccdd915bbcf6ee0b578e397cbe502a9
SHA51266a83792ba0385b72c8f29c96d249a6b5cc32aa5c41a72b5b03c6a3a9e872332f87afd4b1a720fd684cc5dfd0ddfe73271a91690b11d6d397ac7a27cfec87cd4
-
memory/1764-7-0x0000000002FB0000-0x0000000003488000-memory.dmpFilesize
4.8MB
-
memory/1764-18-0x0000000000400000-0x0000000000B2B000-memory.dmpFilesize
7.2MB
-
memory/2884-13-0x00000000001E0000-0x00000000006B8000-memory.dmpFilesize
4.8MB
-
memory/2884-11-0x0000000074FA0000-0x0000000074FA9000-memory.dmpFilesize
36KB
-
memory/2884-12-0x0000000074870000-0x00000000748BA000-memory.dmpFilesize
296KB
-
memory/2884-10-0x0000000075790000-0x00000000758A0000-memory.dmpFilesize
1.1MB
-
memory/2884-14-0x00000000001E0000-0x00000000006B8000-memory.dmpFilesize
4.8MB
-
memory/2884-15-0x0000000074100000-0x00000000747EE000-memory.dmpFilesize
6.9MB
-
memory/2884-16-0x0000000075CE0000-0x0000000075DAC000-memory.dmpFilesize
816KB
-
memory/2884-17-0x0000000075570000-0x0000000075660000-memory.dmpFilesize
960KB
-
memory/2884-8-0x00000000001E0000-0x00000000006B8000-memory.dmpFilesize
4.8MB
-
memory/2884-21-0x0000000075790000-0x00000000758A0000-memory.dmpFilesize
1.1MB
-
memory/2884-23-0x0000000074870000-0x00000000748BA000-memory.dmpFilesize
296KB
-
memory/2884-24-0x0000000074100000-0x00000000747EE000-memory.dmpFilesize
6.9MB
-
memory/2884-25-0x0000000075570000-0x0000000075660000-memory.dmpFilesize
960KB