Overview
overview
10Static
static
3cerber.exe
windows7-x64
cryptowall.exe
windows7-x64
9jigsaw.exe
windows7-x64
10Locky.exe
windows7-x64
10131.exe
windows7-x64
1Matsnu-MBR...3 .exe
windows7-x64
7027cc450ef...d9.dll
windows7-x64
10027cc450ef...ju.dll
windows7-x64
10myguy.hta
windows7-x64
10svchost.exe
windows7-x64
7Resubmissions
05-08-2024 22:23
240805-2ba2rathle 1027-04-2024 00:38
240427-ay3xhafc53 1020-04-2024 05:28
240420-f6ht7aad5w 10Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
cerber.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cryptowall.exe
Resource
win7-20240729-en
Behavioral task
behavioral3
Sample
jigsaw.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Locky.exe
Resource
win7-20240708-en
Behavioral task
behavioral5
Sample
131.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win7-20240729-en
Behavioral task
behavioral7
Sample
027cc450ef5f8c5f653329641ec1fed9.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745_98STJd8lju.dll
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
myguy.hta
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
svchost.exe
Resource
win7-20240704-en
General
-
Target
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
-
Size
102KB
-
MD5
1b2d2a4b97c7c2727d571bbf9376f54f
-
SHA1
1fc29938ec5c209ba900247d2919069b320d33b0
-
SHA256
7634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
-
SHA512
506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0
-
SSDEEP
1536:jj+Rj1lGIXKSmE17v97yiqHGMRPtbsLW8/V2k12v1/BDxVyCfCrCAc:jjw6Sf0iqmMnb2W02v3mCf4Nc
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 2128 svchost.exe -
Executes dropped EXE 2 IoCs
Processes:
kzdfnnmlcg.prekzdfnnmlcg.prepid process 2808 kzdfnnmlcg.pre 2644 kzdfnnmlcg.pre -
Loads dropped DLL 3 IoCs
Processes:
svchost.exekzdfnnmlcg.prepid process 2128 svchost.exe 2128 svchost.exe 2808 kzdfnnmlcg.pre -
Processes:
resource yara_rule behavioral6/memory/2120-10-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral6/memory/2120-12-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral6/memory/2120-11-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral6/memory/2120-8-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral6/memory/2120-13-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral6/memory/2120-4-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral6/memory/2120-2-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral6/memory/2644-48-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\yyvktcju = "C:\\Users\\Admin\\AppData\\Roaming\\Erymz\\yvbkstytcju.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exekzdfnnmlcg.predescription pid process target process PID 2384 set thread context of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2808 set thread context of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.exeMatsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exeMatsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exesvchost.exekzdfnnmlcg.prekzdfnnmlcg.predescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kzdfnnmlcg.pre Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kzdfnnmlcg.pre -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exeMatsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exepid process 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 2120 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exeMatsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exesvchost.exekzdfnnmlcg.prekzdfnnmlcg.predescription pid process target process PID 2384 wrote to memory of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2384 wrote to memory of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2384 wrote to memory of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2384 wrote to memory of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2384 wrote to memory of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2384 wrote to memory of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2384 wrote to memory of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2384 wrote to memory of 2120 2384 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe PID 2120 wrote to memory of 2128 2120 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe svchost.exe PID 2120 wrote to memory of 2128 2120 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe svchost.exe PID 2120 wrote to memory of 2128 2120 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe svchost.exe PID 2120 wrote to memory of 2128 2120 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe svchost.exe PID 2120 wrote to memory of 2128 2120 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe svchost.exe PID 2128 wrote to memory of 2808 2128 svchost.exe kzdfnnmlcg.pre PID 2128 wrote to memory of 2808 2128 svchost.exe kzdfnnmlcg.pre PID 2128 wrote to memory of 2808 2128 svchost.exe kzdfnnmlcg.pre PID 2128 wrote to memory of 2808 2128 svchost.exe kzdfnnmlcg.pre PID 2808 wrote to memory of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre PID 2808 wrote to memory of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre PID 2808 wrote to memory of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre PID 2808 wrote to memory of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre PID 2808 wrote to memory of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre PID 2808 wrote to memory of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre PID 2808 wrote to memory of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre PID 2808 wrote to memory of 2644 2808 kzdfnnmlcg.pre kzdfnnmlcg.pre PID 2644 wrote to memory of 2664 2644 kzdfnnmlcg.pre svchost.exe PID 2644 wrote to memory of 2664 2644 kzdfnnmlcg.pre svchost.exe PID 2644 wrote to memory of 2664 2644 kzdfnnmlcg.pre svchost.exe PID 2644 wrote to memory of 2664 2644 kzdfnnmlcg.pre svchost.exe PID 2644 wrote to memory of 2664 2644 kzdfnnmlcg.pre svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\kzdfnnmlcg.preC:\Users\Admin\AppData\Local\Temp\kzdfnnmlcg.pre4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\kzdfnnmlcg.preC:\Users\Admin\AppData\Local\Temp\kzdfnnmlcg.pre5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD51b2d2a4b97c7c2727d571bbf9376f54f
SHA11fc29938ec5c209ba900247d2919069b320d33b0
SHA2567634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
SHA512506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0