Overview
overview
10Static
static
3cerber.exe
windows7-x64
10cerber.exe
windows10-2004-x64
10cryptowall.exe
windows7-x64
9cryptowall.exe
windows10-2004-x64
3jigsaw.exe
windows7-x64
10jigsaw.exe
windows10-2004-x64
10Locky.exe
windows7-x64
10Locky.exe
windows10-2004-x64
10131.exe
windows7-x64
1131.exe
windows10-2004-x64
3Matsnu-MBR...3 .exe
windows7-x64
7Matsnu-MBR...3 .exe
windows10-2004-x64
3027cc450ef...d9.dll
windows7-x64
10027cc450ef...d9.dll
windows10-2004-x64
10myguy.hta
windows7-x64
10myguy.hta
windows10-2004-x64
7svchost.exe
windows7-x64
7svchost.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
cerber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cerber.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
cryptowall.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cryptowall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
jigsaw.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
jigsaw.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Locky.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Locky.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
131.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
131.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
027cc450ef5f8c5f653329641ec1fed9.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
027cc450ef5f8c5f653329641ec1fed9.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
myguy.hta
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
myguy.hta
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
svchost.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
svchost.exe
Resource
win10v2004-20240802-en
General
-
Target
Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe
-
Size
102KB
-
MD5
1b2d2a4b97c7c2727d571bbf9376f54f
-
SHA1
1fc29938ec5c209ba900247d2919069b320d33b0
-
SHA256
7634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
-
SHA512
506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0
-
SSDEEP
1536:jj+Rj1lGIXKSmE17v97yiqHGMRPtbsLW8/V2k12v1/BDxVyCfCrCAc:jjw6Sf0iqmMnb2W02v3mCf4Nc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2836 svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1932 wfuiprchks.pre 2172 wfuiprchks.pre -
Loads dropped DLL 3 IoCs
pid Process 2836 svchost.exe 2836 svchost.exe 1932 wfuiprchks.pre -
resource yara_rule behavioral11/memory/2796-8-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2796-11-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2796-4-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2796-2-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2796-14-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2796-12-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2796-13-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2796-17-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral11/memory/2172-50-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\buxteycn = "C:\\Users\\Admin\\AppData\\Roaming\\Mficprybsyn\\nfwlchreycn.exe" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2116 set thread context of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 1932 set thread context of 2172 1932 wfuiprchks.pre 33 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfuiprchks.pre Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfuiprchks.pre Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 2796 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2116 wrote to memory of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2116 wrote to memory of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2116 wrote to memory of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2116 wrote to memory of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2116 wrote to memory of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2116 wrote to memory of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2116 wrote to memory of 2796 2116 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 30 PID 2796 wrote to memory of 2836 2796 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2796 wrote to memory of 2836 2796 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2796 wrote to memory of 2836 2796 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2796 wrote to memory of 2836 2796 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2796 wrote to memory of 2836 2796 Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe 31 PID 2836 wrote to memory of 1932 2836 svchost.exe 32 PID 2836 wrote to memory of 1932 2836 svchost.exe 32 PID 2836 wrote to memory of 1932 2836 svchost.exe 32 PID 2836 wrote to memory of 1932 2836 svchost.exe 32 PID 1932 wrote to memory of 2172 1932 wfuiprchks.pre 33 PID 1932 wrote to memory of 2172 1932 wfuiprchks.pre 33 PID 1932 wrote to memory of 2172 1932 wfuiprchks.pre 33 PID 1932 wrote to memory of 2172 1932 wfuiprchks.pre 33 PID 1932 wrote to memory of 2172 1932 wfuiprchks.pre 33 PID 1932 wrote to memory of 2172 1932 wfuiprchks.pre 33 PID 1932 wrote to memory of 2172 1932 wfuiprchks.pre 33 PID 1932 wrote to memory of 2172 1932 wfuiprchks.pre 33 PID 2172 wrote to memory of 2192 2172 wfuiprchks.pre 34 PID 2172 wrote to memory of 2192 2172 wfuiprchks.pre 34 PID 2172 wrote to memory of 2192 2172 wfuiprchks.pre 34 PID 2172 wrote to memory of 2192 2172 wfuiprchks.pre 34 PID 2172 wrote to memory of 2192 2172 wfuiprchks.pre 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"C:\Users\Admin\AppData\Local\Temp\Matsnu-MBRwipingRansomware_1B2D2A4B97C7C2727D571BBF9376F54F_Inkasso Rechnung vom 27.05.2013 .exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\wfuiprchks.preC:\Users\Admin\AppData\Local\Temp\wfuiprchks.pre4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\wfuiprchks.preC:\Users\Admin\AppData\Local\Temp\wfuiprchks.pre5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2192
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD51b2d2a4b97c7c2727d571bbf9376f54f
SHA11fc29938ec5c209ba900247d2919069b320d33b0
SHA2567634433f8fcf4d13fb46d680802e48eeb160e0f51e228cae058436845976381e
SHA512506fc96423e5e2e38078806591e09a6eb3cf924eb748af528f7315aa0b929890823798a3ef2a5809c14023c3ff8a3db36277bc90c7b099218422aafa4e0c2ee0