Analysis
-
max time kernel
2s -
max time network
38s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-05-2021 14:42
Static task
static1
Behavioral task
behavioral1
Sample
d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe
Resource
win10v20210410
General
-
Target
d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe
-
Size
788KB
-
MD5
bf7a7748c4499a6d44c688ba37896a53
-
SHA1
45c68363fdb2eeae08c827307206f6f9fe7bf944
-
SHA256
d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095
-
SHA512
60089da79f1b8e72ce6e0ebcfc9fac7e3b1b82cc49b64be89556b4c89b4b117db95c158eb6126be2a3291a22cca5640ffe5f4710f0a3fab42ac40d8151ec4602
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1844 wrote to memory of 376 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 5 PID 1844 wrote to memory of 376 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 5 PID 1844 wrote to memory of 376 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 5 PID 1844 wrote to memory of 376 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 5 PID 1844 wrote to memory of 376 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 5 PID 1844 wrote to memory of 376 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 5 PID 1844 wrote to memory of 376 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 5 PID 1844 wrote to memory of 384 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 4 PID 1844 wrote to memory of 384 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 4 PID 1844 wrote to memory of 384 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 4 PID 1844 wrote to memory of 384 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 4 PID 1844 wrote to memory of 384 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 4 PID 1844 wrote to memory of 384 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 4 PID 1844 wrote to memory of 384 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 4 PID 1844 wrote to memory of 424 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 3 PID 1844 wrote to memory of 424 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 3 PID 1844 wrote to memory of 424 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 3 PID 1844 wrote to memory of 424 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 3 PID 1844 wrote to memory of 424 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 3 PID 1844 wrote to memory of 424 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 3 PID 1844 wrote to memory of 424 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 3 PID 1844 wrote to memory of 468 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 2 PID 1844 wrote to memory of 468 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 2 PID 1844 wrote to memory of 468 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 2 PID 1844 wrote to memory of 468 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 2 PID 1844 wrote to memory of 468 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 2 PID 1844 wrote to memory of 468 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 2 PID 1844 wrote to memory of 468 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 2 PID 1844 wrote to memory of 484 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1 PID 1844 wrote to memory of 484 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1 PID 1844 wrote to memory of 484 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1 PID 1844 wrote to memory of 484 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1 PID 1844 wrote to memory of 484 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1 PID 1844 wrote to memory of 484 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1 PID 1844 wrote to memory of 484 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 1 PID 1844 wrote to memory of 492 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 23 PID 1844 wrote to memory of 492 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 23 PID 1844 wrote to memory of 492 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 23 PID 1844 wrote to memory of 492 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 23 PID 1844 wrote to memory of 492 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 23 PID 1844 wrote to memory of 492 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 23 PID 1844 wrote to memory of 492 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 23 PID 1844 wrote to memory of 592 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 8 PID 1844 wrote to memory of 592 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 8 PID 1844 wrote to memory of 592 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 8 PID 1844 wrote to memory of 592 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 8 PID 1844 wrote to memory of 592 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 8 PID 1844 wrote to memory of 592 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 8 PID 1844 wrote to memory of 592 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 8 PID 1844 wrote to memory of 668 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 22 PID 1844 wrote to memory of 668 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 22 PID 1844 wrote to memory of 668 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 22 PID 1844 wrote to memory of 668 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 22 PID 1844 wrote to memory of 668 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 22 PID 1844 wrote to memory of 668 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 22 PID 1844 wrote to memory of 668 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 22 PID 1844 wrote to memory of 744 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 21 PID 1844 wrote to memory of 744 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 21 PID 1844 wrote to memory of 744 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 21 PID 1844 wrote to memory of 744 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 21 PID 1844 wrote to memory of 744 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 21 PID 1844 wrote to memory of 744 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 21 PID 1844 wrote to memory of 744 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 21 PID 1844 wrote to memory of 808 1844 d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe 20
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:484
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1140
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1056
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:652
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:876
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:2036
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:808
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:668
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:424
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:376
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:492
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe"C:\Users\Admin\AppData\Local\Temp\d21aef628fbb7f3ac19b13c3a10f838179798a2c442c26bf68fd444e9c5d3095.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200