Analysis
-
max time kernel
15s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-04-2021 09:21
Static task
static1
Behavioral task
behavioral1
Sample
FA0900009000.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
FA0900009000.exe
Resource
win10v20210408
General
-
Target
FA0900009000.exe
-
Size
415KB
-
MD5
f5bbc275c2fe8892a7173cec02b48344
-
SHA1
fb2bb2d7b845e442418f451dca20a1ca4fc45c5b
-
SHA256
3bc2abc2f4f8e56df7dcc64602b053f62ade2953d76b6020a21c252cc86a41db
-
SHA512
ce518ef7add1718ee63d0b7229f9a34a40a8060a21800de5191e5a0ecbbb1b88e6c35fcd795f42c54f9467b546873301470060c5a117bff10dd8fff7e664ff87
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
FA0900009000.exepid process 668 FA0900009000.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
FA0900009000.exedescription pid process target process PID 668 set thread context of 3048 668 FA0900009000.exe FA0900009000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
FA0900009000.exepid process 668 FA0900009000.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
FA0900009000.exepid process 3048 FA0900009000.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
FA0900009000.exedescription pid process target process PID 668 wrote to memory of 3048 668 FA0900009000.exe FA0900009000.exe PID 668 wrote to memory of 3048 668 FA0900009000.exe FA0900009000.exe PID 668 wrote to memory of 3048 668 FA0900009000.exe FA0900009000.exe PID 668 wrote to memory of 3048 668 FA0900009000.exe FA0900009000.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FA0900009000.exe"C:\Users\Admin\AppData\Local\Temp\FA0900009000.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\FA0900009000.exe"C:\Users\Admin\AppData\Local\Temp\FA0900009000.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2b289ab120d95236da9f742ae16c77c1
SHA196807a2b3d9c4fd21cc446fbfef5b564b3a39938
SHA256239e71634074d7e78af7dca14bbda6f80a67c48be2c6ac7fcdf4d4eba2d2fb8c
SHA512f20f17b4ea35e6d837db3396bc42457e7f5f412db68bbf993a9e2d1dfc4b6c8908f19c71e4d8d6afea41f27d5f2e230e3ec7ff79ed4ba20947831c1455fa67d4