Analysis
-
max time kernel
128s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-05-2021 16:03
Static task
static1
Behavioral task
behavioral1
Sample
Goods240521.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Goods240521.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
Goods240521.exe
-
Size
1.4MB
-
MD5
13521ca08216f7aaa0541a2ad77aeb2f
-
SHA1
3bb4bde4b535a15fc5d9bde3640f7243607efd96
-
SHA256
a1492c16ac7f3a351538573eb52ef614e19cd137d28672d8117eead8da570660
-
SHA512
0bd4357f46acc5944e699b1d1dfa9dd027bd9d7833be14dbabc626c9e7b7a2875455789a0b87f953d2a669dacf8040b1d8834b5f2923265de515389a2cb18a2c
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 780 set thread context of 3972 780 Goods240521.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2508 powershell.exe 2728 powershell.exe 2728 powershell.exe 3152 powershell.exe 2508 powershell.exe 3152 powershell.exe 3152 powershell.exe 2728 powershell.exe 2508 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3972 Goods240521.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2508 powershell.exe Token: SeDebugPrivilege 2728 powershell.exe Token: SeDebugPrivilege 3152 powershell.exe Token: SeShutdownPrivilege 3972 Goods240521.exe Token: SeCreatePagefilePrivilege 3972 Goods240521.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 780 wrote to memory of 2508 780 Goods240521.exe 79 PID 780 wrote to memory of 2508 780 Goods240521.exe 79 PID 780 wrote to memory of 2508 780 Goods240521.exe 79 PID 780 wrote to memory of 2728 780 Goods240521.exe 81 PID 780 wrote to memory of 2728 780 Goods240521.exe 81 PID 780 wrote to memory of 2728 780 Goods240521.exe 81 PID 780 wrote to memory of 3900 780 Goods240521.exe 83 PID 780 wrote to memory of 3900 780 Goods240521.exe 83 PID 780 wrote to memory of 3900 780 Goods240521.exe 83 PID 780 wrote to memory of 3152 780 Goods240521.exe 85 PID 780 wrote to memory of 3152 780 Goods240521.exe 85 PID 780 wrote to memory of 3152 780 Goods240521.exe 85 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 780 wrote to memory of 3972 780 Goods240521.exe 86 PID 3972 wrote to memory of 2464 3972 Goods240521.exe 89 PID 3972 wrote to memory of 2464 3972 Goods240521.exe 89 PID 3972 wrote to memory of 2464 3972 Goods240521.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Goods240521.exe"C:\Users\Admin\AppData\Local\Temp\Goods240521.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Goods240521.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lpyORIigWWW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lpyORIigWWW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE4D3.tmp"2⤵
- Creates scheduled task(s)
PID:3900
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lpyORIigWWW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\Goods240521.exe"C:\Users\Admin\AppData\Local\Temp\Goods240521.exe"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Nl4TJGqDgYqQmMpN.bat" "3⤵PID:2464
-
-