Analysis

  • max time kernel
    585s
  • max time network
    592s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-04-2021 19:21

General

  • Target

    ollydbg.exe

  • Size

    1.4MB

  • MD5

    6fd063d51d7077506e5a5bafe7963ee4

  • SHA1

    02a59a8e5c2cc9ae88a985311406902e1413c37d

  • SHA256

    321477e3f037675fa9556c46df741a58f554b18e2142f1e7b792c0a4a030ea5e

  • SHA512

    34e22bf3eaf3e9d4d3f336abf33ed9e5868ef0091399b17a492ee838017c1b6f4b9482ef09cddcc1393aff0e690ccdbb8f1da70bc015d420373abcf9d790d7b1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ollydbg.exe
    "C:\Users\Admin\AppData\Local\Temp\ollydbg.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:424
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3716

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads