Overview
overview
10Static
static
3cerber.exe
windows7-x64
10cerber.exe
windows10-2004-x64
10cryptowall.exe
windows7-x64
9cryptowall.exe
windows10-2004-x64
3jigsaw.exe
windows7-x64
10jigsaw.exe
windows10-2004-x64
Locky.exe
windows7-x64
10Locky.exe
windows10-2004-x64
10131.exe
windows7-x64
1131.exe
windows10-2004-x64
3Matsnu-MBR...3 .exe
windows7-x64
7Matsnu-MBR...3 .exe
windows10-2004-x64
3027cc450ef...d9.dll
windows7-x64
10027cc450ef...d9.dll
windows10-2004-x64
10027cc450ef...ju.dll
windows7-x64
10027cc450ef...ju.dll
windows10-2004-x64
10myguy.hta
windows7-x64
10myguy.hta
windows10-2004-x64
7svchost.exe
windows7-x64
7svchost.exe
windows10-2004-x64
7Analysis
-
max time kernel
596s -
max time network
597s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
cerber.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cerber.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
cryptowall.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cryptowall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
jigsaw.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
jigsaw.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral7
Sample
Locky.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Locky.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
131.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
131.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
027cc450ef5f8c5f653329641ec1fed9.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
027cc450ef5f8c5f653329641ec1fed9.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745_98STJd8lju.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745_98STJd8lju.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
myguy.hta
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
myguy.hta
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
svchost.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
svchost.exe
Resource
win10v2004-20240802-en
General
-
Target
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
-
Size
102KB
-
MD5
1b2d2a4b97c7c2727d571bbf9376f54f
-
SHA1
1fc29938ec5c209ba900247d2919069b320d33b0
-
SHA256
7634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
-
SHA512
506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0
-
SSDEEP
1536:jj+Rj1lGIXKSmE17v97yiqHGMRPtbsLW8/V2k12v1/BDxVyCfCrCAc:jjw6Sf0iqmMnb2W02v3mCf4Nc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2752 yzkiylmlhf.pre 2768 yzkiylmlhf.pre -
Loads dropped DLL 3 IoCs
pid Process 2352 svchost.exe 2352 svchost.exe 2752 yzkiylmlhf.pre -
resource yara_rule behavioral11/memory/2412-8-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2412-10-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2412-4-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2412-2-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2412-11-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2412-13-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2412-12-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2412-14-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2412-17-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2768-45-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2768-48-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\yttyxezk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Avfeogxlpq\\zpmnuxezk.exe" ctfmon.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1448 set thread context of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2752 set thread context of 2768 2752 yzkiylmlhf.pre 34 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzkiylmlhf.pre Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yzkiylmlhf.pre Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 2412 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 1448 wrote to memory of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 1448 wrote to memory of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 1448 wrote to memory of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 1448 wrote to memory of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 1448 wrote to memory of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 1448 wrote to memory of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 1448 wrote to memory of 2412 1448 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2412 wrote to memory of 2352 2412 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2412 wrote to memory of 2352 2412 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2412 wrote to memory of 2352 2412 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2412 wrote to memory of 2352 2412 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2412 wrote to memory of 2352 2412 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2352 wrote to memory of 2752 2352 svchost.exe 32 PID 2352 wrote to memory of 2752 2352 svchost.exe 32 PID 2352 wrote to memory of 2752 2352 svchost.exe 32 PID 2352 wrote to memory of 2752 2352 svchost.exe 32 PID 2752 wrote to memory of 2768 2752 yzkiylmlhf.pre 34 PID 2752 wrote to memory of 2768 2752 yzkiylmlhf.pre 34 PID 2752 wrote to memory of 2768 2752 yzkiylmlhf.pre 34 PID 2752 wrote to memory of 2768 2752 yzkiylmlhf.pre 34 PID 2752 wrote to memory of 2768 2752 yzkiylmlhf.pre 34 PID 2752 wrote to memory of 2768 2752 yzkiylmlhf.pre 34 PID 2752 wrote to memory of 2768 2752 yzkiylmlhf.pre 34 PID 2752 wrote to memory of 2768 2752 yzkiylmlhf.pre 34 PID 2768 wrote to memory of 2656 2768 yzkiylmlhf.pre 35 PID 2768 wrote to memory of 2656 2768 yzkiylmlhf.pre 35 PID 2768 wrote to memory of 2656 2768 yzkiylmlhf.pre 35 PID 2768 wrote to memory of 2656 2768 yzkiylmlhf.pre 35 PID 2768 wrote to memory of 2656 2768 yzkiylmlhf.pre 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\yzkiylmlhf.preC:\Users\Admin\AppData\Local\Temp\yzkiylmlhf.pre4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\yzkiylmlhf.preC:\Users\Admin\AppData\Local\Temp\yzkiylmlhf.pre5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD51b2d2a4b97c7c2727d571bbf9376f54f
SHA11fc29938ec5c209ba900247d2919069b320d33b0
SHA2567634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
SHA512506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0