Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 03:43
Behavioral task
behavioral1
Sample
f23eb3ea68268f77a4673c5753b3409d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f23eb3ea68268f77a4673c5753b3409d.exe
Resource
win10v2004-20240226-en
General
-
Target
f23eb3ea68268f77a4673c5753b3409d.exe
-
Size
73KB
-
MD5
f23eb3ea68268f77a4673c5753b3409d
-
SHA1
83286e6bb153061b828c00abef073b8e77f3688a
-
SHA256
63155d13318ad6ae285d519a78e49906a74ff0590b93c0c4f79922cf50d03ce1
-
SHA512
790fc037ff637a015fb487409d3ba687ec7daf7b1fe7f3fa152d490c1e505843e86a9abad4392844962afcdc971eacca7abf72748cc908d881c6b80bb67d63ab
-
SSDEEP
1536:2555555555555pmgSeGDjtQhnwmmB0yJMqqU+2bbbAV2/S2mr3IdE8mne0Avu5ry:nMSjOnrmBxMqqDL2/mr3IdE8we0Avu5h
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fygbaczsrrd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f23eb3ea68268f77a4673c5753b3409d.exe" f23eb3ea68268f77a4673c5753b3409d.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\G: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\Q: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\S: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\B: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\L: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\N: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\P: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\W: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\Z: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\J: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\I: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\K: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\M: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\O: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\Y: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\H: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\R: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\T: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\U: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\V: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\X: f23eb3ea68268f77a4673c5753b3409d.exe File opened (read-only) \??\A: f23eb3ea68268f77a4673c5753b3409d.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f23eb3ea68268f77a4673c5753b3409d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f23eb3ea68268f77a4673c5753b3409d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier f23eb3ea68268f77a4673c5753b3409d.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1828 f23eb3ea68268f77a4673c5753b3409d.exe 1828 f23eb3ea68268f77a4673c5753b3409d.exe 1828 f23eb3ea68268f77a4673c5753b3409d.exe 1828 f23eb3ea68268f77a4673c5753b3409d.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1828 wrote to memory of 2908 1828 f23eb3ea68268f77a4673c5753b3409d.exe 102 PID 1828 wrote to memory of 2908 1828 f23eb3ea68268f77a4673c5753b3409d.exe 102 PID 1828 wrote to memory of 2908 1828 f23eb3ea68268f77a4673c5753b3409d.exe 102 PID 1828 wrote to memory of 1328 1828 f23eb3ea68268f77a4673c5753b3409d.exe 110 PID 1828 wrote to memory of 1328 1828 f23eb3ea68268f77a4673c5753b3409d.exe 110 PID 1828 wrote to memory of 1328 1828 f23eb3ea68268f77a4673c5753b3409d.exe 110 PID 1828 wrote to memory of 4376 1828 f23eb3ea68268f77a4673c5753b3409d.exe 116 PID 1828 wrote to memory of 4376 1828 f23eb3ea68268f77a4673c5753b3409d.exe 116 PID 1828 wrote to memory of 4376 1828 f23eb3ea68268f77a4673c5753b3409d.exe 116 PID 1828 wrote to memory of 4220 1828 f23eb3ea68268f77a4673c5753b3409d.exe 118 PID 1828 wrote to memory of 4220 1828 f23eb3ea68268f77a4673c5753b3409d.exe 118 PID 1828 wrote to memory of 4220 1828 f23eb3ea68268f77a4673c5753b3409d.exe 118 PID 1828 wrote to memory of 2208 1828 f23eb3ea68268f77a4673c5753b3409d.exe 120 PID 1828 wrote to memory of 2208 1828 f23eb3ea68268f77a4673c5753b3409d.exe 120 PID 1828 wrote to memory of 2208 1828 f23eb3ea68268f77a4673c5753b3409d.exe 120 PID 1828 wrote to memory of 3444 1828 f23eb3ea68268f77a4673c5753b3409d.exe 123 PID 1828 wrote to memory of 3444 1828 f23eb3ea68268f77a4673c5753b3409d.exe 123 PID 1828 wrote to memory of 3444 1828 f23eb3ea68268f77a4673c5753b3409d.exe 123 PID 1828 wrote to memory of 1520 1828 f23eb3ea68268f77a4673c5753b3409d.exe 125 PID 1828 wrote to memory of 1520 1828 f23eb3ea68268f77a4673c5753b3409d.exe 125 PID 1828 wrote to memory of 1520 1828 f23eb3ea68268f77a4673c5753b3409d.exe 125 PID 1828 wrote to memory of 4152 1828 f23eb3ea68268f77a4673c5753b3409d.exe 127 PID 1828 wrote to memory of 4152 1828 f23eb3ea68268f77a4673c5753b3409d.exe 127 PID 1828 wrote to memory of 4152 1828 f23eb3ea68268f77a4673c5753b3409d.exe 127 PID 1828 wrote to memory of 4700 1828 f23eb3ea68268f77a4673c5753b3409d.exe 135 PID 1828 wrote to memory of 4700 1828 f23eb3ea68268f77a4673c5753b3409d.exe 135 PID 1828 wrote to memory of 4700 1828 f23eb3ea68268f77a4673c5753b3409d.exe 135 PID 1828 wrote to memory of 4696 1828 f23eb3ea68268f77a4673c5753b3409d.exe 139 PID 1828 wrote to memory of 4696 1828 f23eb3ea68268f77a4673c5753b3409d.exe 139 PID 1828 wrote to memory of 4696 1828 f23eb3ea68268f77a4673c5753b3409d.exe 139 PID 1828 wrote to memory of 3484 1828 f23eb3ea68268f77a4673c5753b3409d.exe 141 PID 1828 wrote to memory of 3484 1828 f23eb3ea68268f77a4673c5753b3409d.exe 141 PID 1828 wrote to memory of 3484 1828 f23eb3ea68268f77a4673c5753b3409d.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\f23eb3ea68268f77a4673c5753b3409d.exe"C:\Users\Admin\AppData\Local\Temp\f23eb3ea68268f77a4673c5753b3409d.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:1328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4376
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4220
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:2208
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3444
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1520
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:4152
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4700
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4696
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3820 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:1356