Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-05-2021 08:04
Static task
static1
Behavioral task
behavioral1
Sample
49545f0af79ded22054bfd851bb3d864.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
49545f0af79ded22054bfd851bb3d864.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
49545f0af79ded22054bfd851bb3d864.exe
-
Size
87KB
-
MD5
49545f0af79ded22054bfd851bb3d864
-
SHA1
35db307d4e2d287e005262a5d5edd56b73bfc415
-
SHA256
004cae62d64d4fd40532660626ef95b5c5a899de64e060f9e6223974219ef080
-
SHA512
96a3366ba95c669d81803ab8157364df0e7dc2ef6f6e0f80775e0a8d21c79ab12c162de4a444ce13cba4d76bce6dd05b1356f2ad13a613e015a9e60b01f6956a
Score
10/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3180 explorer.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbcbedd4b56a64913eb91b5733046b75.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fbcbedd4b56a64913eb91b5733046b75.exe explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\fbcbedd4b56a64913eb91b5733046b75 = "\"C:\\ProgramData\\explorer.exe\" .." explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fbcbedd4b56a64913eb91b5733046b75 = "\"C:\\ProgramData\\explorer.exe\" .." explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe Token: 33 3180 explorer.exe Token: SeIncBasePriorityPrivilege 3180 explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3896 wrote to memory of 3180 3896 49545f0af79ded22054bfd851bb3d864.exe 78 PID 3896 wrote to memory of 3180 3896 49545f0af79ded22054bfd851bb3d864.exe 78 PID 3896 wrote to memory of 3180 3896 49545f0af79ded22054bfd851bb3d864.exe 78 PID 3180 wrote to memory of 3548 3180 explorer.exe 80 PID 3180 wrote to memory of 3548 3180 explorer.exe 80 PID 3180 wrote to memory of 3548 3180 explorer.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\49545f0af79ded22054bfd851bb3d864.exe"C:\Users\Admin\AppData\Local\Temp\49545f0af79ded22054bfd851bb3d864.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\ProgramData\explorer.exe"C:\ProgramData\explorer.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\explorer.exe" "explorer.exe" ENABLE3⤵PID:3548
-
-