Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 03:43
Behavioral task
behavioral1
Sample
f23eb3ea68268f77a4673c5753b3409d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f23eb3ea68268f77a4673c5753b3409d.exe
Resource
win10v2004-20240226-en
General
-
Target
f23eb3ea68268f77a4673c5753b3409d.exe
-
Size
73KB
-
MD5
f23eb3ea68268f77a4673c5753b3409d
-
SHA1
83286e6bb153061b828c00abef073b8e77f3688a
-
SHA256
63155d13318ad6ae285d519a78e49906a74ff0590b93c0c4f79922cf50d03ce1
-
SHA512
790fc037ff637a015fb487409d3ba687ec7daf7b1fe7f3fa152d490c1e505843e86a9abad4392844962afcdc971eacca7abf72748cc908d881c6b80bb67d63ab
-
SSDEEP
1536:2555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5ry:nMSjOnrmBxMqqDL2/mr3IdE8we0Avu5h
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kwxeywkxoxt = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f23eb3ea68268f77a4673c5753b3409d.exe" f23eb3ea68268f77a4673c5753b3409d.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\Q: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\R: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\S: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\T: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\U: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\I: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\G: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\L: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\M: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\Y: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\Z: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\E: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\X: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\N: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\B: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\H: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\J: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\K: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\O: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\V: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\W: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\A: f23eb3ea68268f77a4673c5753b3409d.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f23eb3ea68268f77a4673c5753b3409d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier f23eb3ea68268f77a4673c5753b3409d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f23eb3ea68268f77a4673c5753b3409d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 f23eb3ea68268f77a4673c5753b3409d.exe 2220 f23eb3ea68268f77a4673c5753b3409d.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2564 2220 f23eb3ea68268f77a4673c5753b3409d.exe 28 PID 2220 wrote to memory of 2564 2220 f23eb3ea68268f77a4673c5753b3409d.exe 28 PID 2220 wrote to memory of 2564 2220 f23eb3ea68268f77a4673c5753b3409d.exe 28 PID 2220 wrote to memory of 2564 2220 f23eb3ea68268f77a4673c5753b3409d.exe 28 PID 2220 wrote to memory of 2596 2220 f23eb3ea68268f77a4673c5753b3409d.exe 31 PID 2220 wrote to memory of 2596 2220 f23eb3ea68268f77a4673c5753b3409d.exe 31 PID 2220 wrote to memory of 2596 2220 f23eb3ea68268f77a4673c5753b3409d.exe 31 PID 2220 wrote to memory of 2596 2220 f23eb3ea68268f77a4673c5753b3409d.exe 31 PID 2220 wrote to memory of 2500 2220 f23eb3ea68268f77a4673c5753b3409d.exe 33 PID 2220 wrote to memory of 2500 2220 f23eb3ea68268f77a4673c5753b3409d.exe 33 PID 2220 wrote to memory of 2500 2220 f23eb3ea68268f77a4673c5753b3409d.exe 33 PID 2220 wrote to memory of 2500 2220 f23eb3ea68268f77a4673c5753b3409d.exe 33 PID 2220 wrote to memory of 2468 2220 f23eb3ea68268f77a4673c5753b3409d.exe 35 PID 2220 wrote to memory of 2468 2220 f23eb3ea68268f77a4673c5753b3409d.exe 35 PID 2220 wrote to memory of 2468 2220 f23eb3ea68268f77a4673c5753b3409d.exe 35 PID 2220 wrote to memory of 2468 2220 f23eb3ea68268f77a4673c5753b3409d.exe 35 PID 2220 wrote to memory of 2984 2220 f23eb3ea68268f77a4673c5753b3409d.exe 37 PID 2220 wrote to memory of 2984 2220 f23eb3ea68268f77a4673c5753b3409d.exe 37 PID 2220 wrote to memory of 2984 2220 f23eb3ea68268f77a4673c5753b3409d.exe 37 PID 2220 wrote to memory of 2984 2220 f23eb3ea68268f77a4673c5753b3409d.exe 37 PID 2220 wrote to memory of 708 2220 f23eb3ea68268f77a4673c5753b3409d.exe 41 PID 2220 wrote to memory of 708 2220 f23eb3ea68268f77a4673c5753b3409d.exe 41 PID 2220 wrote to memory of 708 2220 f23eb3ea68268f77a4673c5753b3409d.exe 41 PID 2220 wrote to memory of 708 2220 f23eb3ea68268f77a4673c5753b3409d.exe 41 PID 2220 wrote to memory of 1636 2220 f23eb3ea68268f77a4673c5753b3409d.exe 43 PID 2220 wrote to memory of 1636 2220 f23eb3ea68268f77a4673c5753b3409d.exe 43 PID 2220 wrote to memory of 1636 2220 f23eb3ea68268f77a4673c5753b3409d.exe 43 PID 2220 wrote to memory of 1636 2220 f23eb3ea68268f77a4673c5753b3409d.exe 43 PID 2220 wrote to memory of 2820 2220 f23eb3ea68268f77a4673c5753b3409d.exe 45 PID 2220 wrote to memory of 2820 2220 f23eb3ea68268f77a4673c5753b3409d.exe 45 PID 2220 wrote to memory of 2820 2220 f23eb3ea68268f77a4673c5753b3409d.exe 45 PID 2220 wrote to memory of 2820 2220 f23eb3ea68268f77a4673c5753b3409d.exe 45 PID 2220 wrote to memory of 2988 2220 f23eb3ea68268f77a4673c5753b3409d.exe 47 PID 2220 wrote to memory of 2988 2220 f23eb3ea68268f77a4673c5753b3409d.exe 47 PID 2220 wrote to memory of 2988 2220 f23eb3ea68268f77a4673c5753b3409d.exe 47 PID 2220 wrote to memory of 2988 2220 f23eb3ea68268f77a4673c5753b3409d.exe 47 PID 2220 wrote to memory of 1884 2220 f23eb3ea68268f77a4673c5753b3409d.exe 49 PID 2220 wrote to memory of 1884 2220 f23eb3ea68268f77a4673c5753b3409d.exe 49 PID 2220 wrote to memory of 1884 2220 f23eb3ea68268f77a4673c5753b3409d.exe 49 PID 2220 wrote to memory of 1884 2220 f23eb3ea68268f77a4673c5753b3409d.exe 49 PID 2220 wrote to memory of 2276 2220 f23eb3ea68268f77a4673c5753b3409d.exe 51 PID 2220 wrote to memory of 2276 2220 f23eb3ea68268f77a4673c5753b3409d.exe 51 PID 2220 wrote to memory of 2276 2220 f23eb3ea68268f77a4673c5753b3409d.exe 51 PID 2220 wrote to memory of 2276 2220 f23eb3ea68268f77a4673c5753b3409d.exe 51 PID 2220 wrote to memory of 1020 2220 f23eb3ea68268f77a4673c5753b3409d.exe 53 PID 2220 wrote to memory of 1020 2220 f23eb3ea68268f77a4673c5753b3409d.exe 53 PID 2220 wrote to memory of 1020 2220 f23eb3ea68268f77a4673c5753b3409d.exe 53 PID 2220 wrote to memory of 1020 2220 f23eb3ea68268f77a4673c5753b3409d.exe 53 PID 2220 wrote to memory of 560 2220 f23eb3ea68268f77a4673c5753b3409d.exe 55 PID 2220 wrote to memory of 560 2220 f23eb3ea68268f77a4673c5753b3409d.exe 55 PID 2220 wrote to memory of 560 2220 f23eb3ea68268f77a4673c5753b3409d.exe 55 PID 2220 wrote to memory of 560 2220 f23eb3ea68268f77a4673c5753b3409d.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\f23eb3ea68268f77a4673c5753b3409d.exe"C:\Users\Admin\AppData\Local\Temp\f23eb3ea68268f77a4673c5753b3409d.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2564
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2596
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2500
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2468
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2984
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:708
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1636
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1884
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:560
-