Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 09:40
Static task
static1
Behavioral task
behavioral1
Sample
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe
Resource
win7-20240221-en
General
-
Target
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe
-
Size
7.1MB
-
MD5
e019295a44882db3321c692f7d818b8b
-
SHA1
2c5f371ac5db8062b876571d20398c60b0b0f584
-
SHA256
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86
-
SHA512
002fb6d60a3c8874c7e257cdb174928cd908223bc3fb553cd9fd6506bfc91b6cb45fdc2909fb069fad9b4a75fefbde3addeacc444bc76f25e47fe560925be4e6
-
SSDEEP
98304:hwdhBkGMb188jaz+2RYKNpYzp5jsvYjJ+tSfby2N/lZU5V1FXwOoopC+2UOZ:f88Oz8hro8+tkt/lZaloopC+
Malware Config
Signatures
-
Detected Ploutus loader 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4816-18-0x0000000000970000-0x0000000000E48000-memory.dmp family_ploutus behavioral2/memory/4816-19-0x0000000000970000-0x0000000000E48000-memory.dmp family_ploutus -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
KOD0ndy6Jy.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ KOD0ndy6Jy.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
KOD0ndy6Jy.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion KOD0ndy6Jy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion KOD0ndy6Jy.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe -
Executes dropped EXE 1 IoCs
Processes:
KOD0ndy6Jy.exepid process 4816 KOD0ndy6Jy.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
KOD0ndy6Jy.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Wine KOD0ndy6Jy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000_Classes\Local Settings 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4016 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exedescription pid process target process PID 672 wrote to memory of 4816 672 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe KOD0ndy6Jy.exe PID 672 wrote to memory of 4816 672 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe KOD0ndy6Jy.exe PID 672 wrote to memory of 4816 672 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe KOD0ndy6Jy.exe PID 672 wrote to memory of 4016 672 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe NOTEPAD.EXE PID 672 wrote to memory of 4016 672 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe NOTEPAD.EXE PID 672 wrote to memory of 4016 672 7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe"C:\Users\Admin\AppData\Local\Temp\7a460e4fb8f9c66685dd430e06d40f15a1bbdf6d7886ebde2cdf99bfa0c59d86.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exe"C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\xdCiyWybC0.txt2⤵
- Opens file in notepad (likely ransom note)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exeFilesize
3.3MB
MD5124ad6606cc9f765211cd2b0ec693d1d
SHA1faf93dc414593c604af7579a1c8b3663b596da45
SHA256811d3ed71642a6b2f49995b79e1aca84025b6ec8cbac5ee99608d354314685a9
SHA512b9e8083174491dd79f3ab7280153827f8860515139f43b1c4dee282e3295973fb8715f1a2a3acaff0fd7c4b489d3eac5a363350728eecc2f00cbc136be46a4eb
-
C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exeFilesize
4.8MB
MD580b4d6f1da00532cbbc22bfc1411ecc6
SHA1022f9f1659645448d852218d046923a7b79a25b4
SHA256a3dd1fee47ec9a9a72283e47b095e67eeb1ec0d7e9df82bc1004bb788b331020
SHA5127bdc622e9806700928ecf3c64ac9e3bc56f0c2a443222f9646fb81db8cbf33b351ad832866501f17f9ad799348396a703ae8c9cb2a2ec7584305efc76c22ac82
-
C:\Users\Admin\AppData\Local\Temp\KOD0ndy6Jy.exeFilesize
4.6MB
MD57d7a64635cc47531a32beb931f7fbb4f
SHA1065b22c226c15382619f90821af08184822b27ca
SHA2566d4a520e1b21242b89d2ecc328fbe82e783f5f439094760067adf252a960a04c
SHA5127457b5243cedfb3172e45ae1a76d3037c50e0673702e8ed2dd561e49b72c3e68afe051bae199bb2a96e47d33b4fddfd0859d066df7e49708acf08aaa3c8fe496
-
C:\Users\Admin\AppData\Local\Temp\xdCiyWybC0.txtMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/672-22-0x0000000000400000-0x0000000000B2B000-memory.dmpFilesize
7.2MB
-
memory/4816-15-0x00000000776D0000-0x00000000777C0000-memory.dmpFilesize
960KB
-
memory/4816-16-0x00000000776D0000-0x00000000777C0000-memory.dmpFilesize
960KB
-
memory/4816-17-0x0000000073030000-0x00000000737E0000-memory.dmpFilesize
7.7MB
-
memory/4816-18-0x0000000000970000-0x0000000000E48000-memory.dmpFilesize
4.8MB
-
memory/4816-19-0x0000000000970000-0x0000000000E48000-memory.dmpFilesize
4.8MB
-
memory/4816-20-0x0000000007470000-0x0000000007A14000-memory.dmpFilesize
5.6MB
-
memory/4816-21-0x0000000004C80000-0x0000000004C8A000-memory.dmpFilesize
40KB
-
memory/4816-11-0x0000000000970000-0x0000000000E48000-memory.dmpFilesize
4.8MB
-
memory/4816-26-0x0000000000970000-0x0000000000E48000-memory.dmpFilesize
4.8MB
-
memory/4816-27-0x00000000776D0000-0x00000000777C0000-memory.dmpFilesize
960KB
-
memory/4816-28-0x00000000776D0000-0x00000000777C0000-memory.dmpFilesize
960KB
-
memory/4816-29-0x0000000073030000-0x00000000737E0000-memory.dmpFilesize
7.7MB