Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/03/2024, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe
Resource
win10v2004-20240226-en
General
-
Target
88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe
-
Size
1.7MB
-
MD5
5f1977ff2e710323036df5bf5fd7df2b
-
SHA1
cf856ca9dfee5a3935d5e7ad192044438ab6c500
-
SHA256
88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a
-
SHA512
8cc6808e0285a73ca90f4247982e1ee635f492a54929bad49c55ebe45f3ba45eba80777043085b811e91ceb72fab744af6e9bc93185b7450a44323886efa743a
-
SSDEEP
49152:2svcOp7uaMh54agPw0Ic02gRotHcBWJz9FNFU:2s0KCHDdg40I9LsFQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2624 windows_encryptor_180870197840.exe -
Loads dropped DLL 7 IoCs
pid Process 768 88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe 2624 windows_encryptor_180870197840.exe 2624 windows_encryptor_180870197840.exe 2624 windows_encryptor_180870197840.exe 2624 windows_encryptor_180870197840.exe 2624 windows_encryptor_180870197840.exe 2624 windows_encryptor_180870197840.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 768 wrote to memory of 2624 768 88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe 28 PID 768 wrote to memory of 2624 768 88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe 28 PID 768 wrote to memory of 2624 768 88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe 28 PID 768 wrote to memory of 2624 768 88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe"C:\Users\Admin\AppData\Local\Temp\88880508fdcc246011c53f8a652d295e9cb95202bb92c7a02e463c405862e86a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\windows_encryptor_180870197840.exe"C:\Users\Admin\AppData\Local\Temp\windows_encryptor_180870197840.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5be3a6ad5ea008a9ee637a70c787438c0
SHA19779f2855cdb9adce2f0c3d96e966062e1ac2742
SHA256ffa16dc5e7c788c8269ab4e00b53aba3f8970e89a7f5c25f967e534f6e10e047
SHA512df9b9a80a6633c7e45dbbc04cb6e8dcd533fac01a6fecf8685cdbe4c283c10277d2e90851575e47e952aa802f4dd803dcd024f06e94e0178d3bd76e5ef4a9bfe
-
Filesize
341KB
MD587d4006fb7140faef9f4a38bcf7b098a
SHA10cc317b73e6fcebce8884cd0820f0b8f578b702b
SHA2569a124a0d54771d360155323f5a1d08a9e852dc392a45ffac3a9ba2cb30ad5da3
SHA512c6d0fe1d6b84e581204f77bc1ab163bec2b6f38aa62460dd665779965f2fb4954ad2eb87ed8e2488bd4cd07246992b4b41fa697f7ab5efb84185c8cb30037fbe
-
Filesize
1.1MB
MD5263263b8395e0c8f153aae906fad2115
SHA1b427c166e72d0fe1e2d4c243f245670833678593
SHA25655de11531dc0e566cb91f26e48d1301a161a4b8b24abed42304d711412368760
SHA51299339321ebf22515dfb8ac38978e1fccb31ea33370afd55f86f6ef7441e2096cef47c1e23bc059ee47059afb10c0523e4605ccf555843d59077c1218ec444140
-
Filesize
137KB
MD5b14f928937e24087a3a4d7b0abc9ac84
SHA1c8402d666433943a556d27c4ecd9b0a66d390feb
SHA25656a5148d00c2d9e58415be2d64eca922a58063fe26d9af1c87084aa383c9058e
SHA512f7bc1886f2355c5ed1ed8799cd159bd1c56207eecc938318447e64e4bf73fc6afe0501803c149140afa4ddb942355835437b25b84900c31c64ca48d765f4a203
-
Filesize
383KB
MD5b4fb65c58608e6ed15e741d0c7b90d4a
SHA11776cb143ae59b8926b87c71309f4f1b21d3fb64
SHA256b9e1acb2ba4c96b9b52bfa5ec25b169e5cb52e688de026c2d964af42e92081e1
SHA51229cafebc97a5c700f8163bd877563ee3c1b4432f6da9f845f4b91e77badd62c5dbec05fe92d5468987e1c7eb6e4ac56b459ee342e6ec99d66685106fb662e3b9
-
Filesize
32KB
MD5c262a0d445f9e205965d67c8371a69f5
SHA11debd5d11a0b01033028c7ea987cdc8fc47b8e57
SHA256e689c781dd0619b02f2a06f9a5648c3246927be14eb3475afde74830545df7f3
SHA5126463003d821e9146ef891d19f0d67e70053ff5f598a5ff76f0cb9b8afffdc4c546f17d73847d901107898b56be034871db6d9171b22a40059c07cc4b7c939300
-
Filesize
327KB
MD5bba9b0e6578c9da54601ea50044b25ed
SHA1dc4f597dcb3363e0ca0077113715d2502683c12a
SHA25622f58b94c7e3d02e8c7192783ef8b802ea6396271f8bb8ce68d2fccf1a672baa
SHA512b2017e022263a39f643c1059ae25ebb90bc479401a929c3f4e23531b7e33e3a7e7f04ab52de8c1fed9ea2702c901f72e27c49bac14489df34f7dd7b6bcf1db29