Analysis
-
max time kernel
15s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-06-2021 18:39
Static task
static1
Behavioral task
behavioral1
Sample
Install.sfx.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Install.sfx.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
Автономная Установка.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
Автономная Установка.exe
Resource
win10v20210410
General
-
Target
Автономная Установка.exe
-
Size
6KB
-
MD5
6ea57e7f9246d44f91fd33c08a68c4a5
-
SHA1
8c0998c1c3b4fd419c24d9f951e8a7cf0a09b6cf
-
SHA256
9db749b9a3a2790b136548a7fdbada5e45428db659a95a05e13691fbb467e605
-
SHA512
d81902bddb500417cef1a1dbde64fbc060a66898e8b11de8a38acdb95b31058c8c2092d0a6d7d4c3a981f701e7fce4ef077b6d61bc59bd2b52ae4b8a47e3151f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3992 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3368 Автономная Установка.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3368 wrote to memory of 3260 3368 Автономная Установка.exe 76 PID 3368 wrote to memory of 3260 3368 Автономная Установка.exe 76 PID 3368 wrote to memory of 3260 3368 Автономная Установка.exe 76 PID 3260 wrote to memory of 200 3260 cmd.exe 78 PID 3260 wrote to memory of 200 3260 cmd.exe 78 PID 3260 wrote to memory of 200 3260 cmd.exe 78 PID 3260 wrote to memory of 3992 3260 cmd.exe 81 PID 3260 wrote to memory of 3992 3260 cmd.exe 81 PID 3260 wrote to memory of 3992 3260 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Автономная Установка.exe"C:\Users\Admin\AppData\Local\Temp\Автономная Установка.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\Автономная Установка.exe" & schtasks /create /tn \ljqtue1y\csgi01ws /tr C:\Users\Admin\AppData\Roaming\svchost.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \ljqtue1y\csgi01ws /tr C:\Users\Admin\AppData\Roaming\svchost.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- Creates scheduled task(s)
PID:3992
-
-