Resubmissions

24/08/2024, 21:59

240824-1v7z6ateqk 10

28/07/2024, 20:08

240728-ywzztswdnb 9

Analysis

  • max time kernel
    79s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28/07/2024, 20:08

General

  • Target

    smert.exe

  • Size

    20KB

  • MD5

    9741dc2a48ef315a5032a3190c6a9752

  • SHA1

    595cfcf134ac6a97a75407350b509ad37666d546

  • SHA256

    419b6c03a01ad10354c6f70c9077d0bc97a04ca03d0e39748823c8d604da7fe2

  • SHA512

    a8f26e08cdb7078f51f716014499f4af3f0be2ed057cbc3f67da38120d69534ff05a010ab8879ec5bfc692caac7db6f47e777d701d733a6cda307aaddb70cb6f

  • SSDEEP

    384:asaFiLCCr05Sx158JLLU4Act6GoMZOaB8BYsszReS:aPwXl1585LUNGoMZOXszR

Score
9/10

Malware Config

Signatures

  • Renames multiple (2029) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 64 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\smert.exe
    "C:\Users\Admin\AppData\Local\Temp\smert.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\smert.exe
      "C:\Users\Admin\AppData\Local\Temp\smert.exe" --foodsum
      2⤵
      • Drops file in Drivers directory
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies system certificate store
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\ja-JP\MpAsDesc.dll.mui.smert

    Filesize

    21KB

    MD5

    3cca6df1db4760a52fe87e64e090833f

    SHA1

    e79d77e0d1e85d4f490260f3a4878905be3b7cd1

    SHA256

    c2103f9920ae8661391ebf230675acb1ce81eb30c1e7d277bef911cc5d4fb7df

    SHA512

    bc41068ab6b382018997141c6c8ba4b2e8a49e9ba55a15a34a3c48b714a1965e2f53238d7260e2d74a5dc5cdbb745bb33657af179018d06cb6e0aa7230c3f682

  • C:\Program Files (x86)\Windows Media Player\fr-FR\mpvis.dll.mui.smert

    Filesize

    2KB

    MD5

    2356f27d021ce3b85ebce6a8ca00ca9b

    SHA1

    b8f9377b7809cec2dd95ed7dc25ecbb7bc7136d0

    SHA256

    80100663476511c671fa285b05c75705b699ff6be148c6b77a81491bd291a52b

    SHA512

    f5eaea730ee31f51f96a1e872f515428ea98d5713163a3b0ade55ef239f61c14e83a25c8084a7267e2f80c33d2c942cb98266c2001c3eda29ae546e7a942bcec

  • C:\Users\Admin\Desktop\ApproveUndo.vb.smert

    Filesize

    475KB

    MD5

    45d977045bc7af29e25b24e66fe148be

    SHA1

    c18ad8f00ef0e77e7862505cf0fa7f3e2b557dec

    SHA256

    9895b0bc8c9c6aad95f1a2f7e7377ca6d228e75765ae7d66cbf97dd38b40b1dc

    SHA512

    7d8cdf330e463644b9ac5d3d9dbfa98e74dc664a827e013d35a97f53bdb4cda289332c964a8b88fe056137fa928602cad3612d9b9b58394e5f0884f6d595be00

  • C:\Users\Admin\Documents\README.txt

    Filesize

    795B

    MD5

    41b2cb92f1ec3aa7cfd2f04cc5b90940

    SHA1

    6fc9bbc669d35b4ce1a1ef282f6318bdd5fd9ee6

    SHA256

    c520a31166e2a3406a928e2d47417bcba208c2ce6493ceb049db8266e4db5f7b

    SHA512

    54e49d7485ab123af68c63da45a3aca5e79f3f9c9055e9a80ee6b2d129603b854ad00d436b437528da98ce4b51a880f7d27cdb75998b35b483b225484e315a31

  • C:\Windows\Cursors\size2_r.cur.smert

    Filesize

    1KB

    MD5

    9074e384b177d9f9c9d121233f489cb1

    SHA1

    20ee68a15c560b17307b5cedc20d6188909799f8

    SHA256

    4bea8d919362e1323e7b84e8f777eba1b4dcd1f2d406e8eb0a4d4cc989cb9c8f

    SHA512

    d0167d85598d9eea1da15448546d772a60ac36785a3265862646aa813162ab70df0e763d9018e77d88549f49fbd2c9d4d02941c52402b4121abc46b9b844e3f0

  • C:\Windows\Media\Savanna\Windows Hardware Remove.wav.smert

    Filesize

    17KB

    MD5

    e1f6f9cb8791888a493df50c05221453

    SHA1

    b55a81a45bcad6b8254fea535bcb7bfe7321c8d9

    SHA256

    dbc743669e9642dba5cb1b253fb4b82469231cabe457043cb4f2d17a48d55785

    SHA512

    e3d5046c6799f0bce8aec427df79f296dab4c39eed286686af6632f281409737c7aff6425d882bc9f75ed996d80c5cec763d81f016ba2f230bbcff7a6c30cc82

  • C:\Windows\System32\C_10010.NLS.smert

    Filesize

    64KB

    MD5

    501ba545c539c473b6b0eb0e97e348eb

    SHA1

    4f68a74f928802b899a7948c9c40182c31ef2f52

    SHA256

    ac7beb0bf74431914f114b02fe901969e70df8df8ef99768e43f0c9228863393

    SHA512

    71f0ff4d03f15c4797df7cc775437ab9a571abd45e56330135b5faa2eaec9ec78709cb2569bf382d78f0413905649612fde79e70af7f819e8421e74a6f486d3b

  • C:\Windows\System32\de-DE\MFC42.dll.mui.smert

    Filesize

    37KB

    MD5

    43f2ecf0bf7712ea198e73f786574995

    SHA1

    30aa7397ea3d23dd5d2bd6c1f7815a0eea2d7196

    SHA256

    6a081d070a70c45d2c138a94f61ef0578ea40cd841fa20e1fc4fe044073e00ff

    SHA512

    c9607109be0223b302acacc0264564d1a935e2d41a00ed12d76a8608f82208324142f449f17ab6a30af94dd96cf780d1765d01a4362ca9690dc7dad55a27a0de

  • C:\Windows\ehome\fr-FR\ehjpnime.dll.mui.smert

    Filesize

    2KB

    MD5

    d91dc58589a605cc0de5ef31a85b8d7c

    SHA1

    5cd8988bae72f3d17a29354060bd2878864c5ade

    SHA256

    3285ff24660ff2c12cf8e993cdfcb91795827f2124b98293258614aed4574e73

    SHA512

    389aeb26ecbfdca278bd6b209ad4c54bbbdc7d0bb991abf652651200bb1acc736eba8db907ecebab7cb45c0c8683ee46c04adf3e618a2e7664097c3f771bb762

  • C:\Windows\ehome\ja-JP\ehchsime.dll.mui.smert

    Filesize

    2KB

    MD5

    d7fb51b5fce5973453d766ba297ca2e1

    SHA1

    b495a3e6e9186c2891d0cdeee19350b33bb499d7

    SHA256

    d35227836ff68f68ce5472dfc4125f4ce3f9af04767afaf58f2e48ef65b10d0f

    SHA512

    07b62ff2e518eac912e58244c5b329e254f9f951d6a4f0c96f867c59d5071bd4eaa6dc0b5d6f3d3b5986a9ccd3d932debaa7e94b16e5c4d173544425c4e89828

  • C:\Windows\inf\hcw72b64.PNF.smert

    Filesize

    57KB

    MD5

    aac31153a755404930fb8fed5185fec9

    SHA1

    36ef62f1d5b26c916eeec7f39c98ff2702aa901b

    SHA256

    1bfa8f0e0ba9ebc4f33c3f71481f6756b37399713955b5a9ce748d29e86f3f6c

    SHA512

    36640ff7b8152398e5b906fc571ee60712ef129b7f91c2b9687c108f7462a3b83e0e38905db103fb89613437eb41fb1a39d4c9ef71af92feb165cddf00489d32

  • C:\Windows\inf\hdaudss.inf.smert

    Filesize

    70KB

    MD5

    74bd9b8260c48dac7fe61ec5ed22bf35

    SHA1

    b0b6d4db175fee6f3aaa38e6959353ec325e22b2

    SHA256

    6c2534cfa79ce1e6034efd34ffd860eedcff9b9f02de620caca169ebf5a4be58

    SHA512

    4b740b22c2ee7ecd9e780051a4335328b86c88f1a58633df4705ae02b0a78abfd7dc74e692f06af16451a6dc2ed1618f33fbf81cfd12b238b4c1f1cb70b38dba

  • C:\Windows\inf\lsi_scsi.inf.smert

    Filesize

    6KB

    MD5

    b00a23695155aee1014d81a627b233bd

    SHA1

    cc70c57624319e227dfe78e38be93e8326ae744c

    SHA256

    df8f50e9c8cb50c8b6eb1cfcf90ff3d4700477fc3e5becf2b6945f0035c37d09

    SHA512

    138c5852f8a93d58e2b8db6b9cb17a264d582b6d47771ef4b75ce770287cb1f98389d5af5a49b4db22b185bdbcf897457dc276a6745faf9054cae7414ca80719

  • C:\Windows\inf\mdmdyna.inf.smert

    Filesize

    84KB

    MD5

    a122f5af69d0a8c43706794c24b4b968

    SHA1

    f53ceea1af0470352f86c8e8ede0170d04b1de71

    SHA256

    c464798fa212fa8141922d0bb5710bc74e32279540beba033bf08d5703bcb61a

    SHA512

    bed2a182d75abd232952c85bf78e0ac51c0d9101dd36b2c9de518d89ab5f92abfe6e5e2598a47ad726ccbd9d71890d54e82e2afd46332cbe35847f6cd61597ac

  • C:\Windows\inf\prnts003.PNF.smert

    Filesize

    15KB

    MD5

    d5fb72f72af4bf0238a0eeaa8baccbae

    SHA1

    171024a7bbe3576c4e9a5384663bd94eebadbf72

    SHA256

    3b3d5788eb8095a0d426e4b9c3ac9359903b01d68abb50cba00d070079966a0d

    SHA512

    665434dc14639197d4e9a81021278c48ffb4bd1599b5f34f7d1772cb8002dbed4cfcd2fba26bd88b6b372c82190d0cd437a6c65fd1df0edaaa85847f151b4016

  • C:\Windows\inf\tpm.inf.smert

    Filesize

    8KB

    MD5

    49a51e930c59361c1efc251cd7d083de

    SHA1

    70d6ce075d2cc1d6c5ad785829e36b543740bf55

    SHA256

    f6346cfa02616a20af320aaa45f10979da259d2b09010ec2abb54895d23d8b56

    SHA512

    6c019fbd28ff6ba43f4436d34f75d3483dcba025200edb726717de50a97eed1f337f36aabd274f2b9c29008e2fe3bb5c5a6ae79852ab6cec6e88be5b76b38e0e