Analysis

  • max time kernel
    12s
  • max time network
    116s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    10-06-2021 23:22

General

  • Target

    6803ee8f500080b6a72a7e391bc4778e.exe

  • Size

    384KB

  • MD5

    6803ee8f500080b6a72a7e391bc4778e

  • SHA1

    82119534bf1f452e9c98352577075073c671da59

  • SHA256

    377030b4311c86adfdbab3a625400cfeae0288f71bb6a3530ed022a9ff87b04e

  • SHA512

    9aee22f0c85862b03d9beebab042f84b2c5b7091181757b06404a3bf2dd4d67be72aff6a283d62897833e90f06a9b02dd396f54d64439b9b8110d643b4a44442

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6803ee8f500080b6a72a7e391bc4778e.exe
    "C:\Users\Admin\AppData\Local\Temp\6803ee8f500080b6a72a7e391bc4778e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im "6803ee8f500080b6a72a7e391bc4778e.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\6803ee8f500080b6a72a7e391bc4778e.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im "6803ee8f500080b6a72a7e391bc4778e.exe" /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3720

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2292-114-0x0000000000000000-mapping.dmp
  • memory/3172-115-0x0000000002070000-0x000000000209F000-memory.dmp
    Filesize

    188KB

  • memory/3172-116-0x0000000000400000-0x0000000000468000-memory.dmp
    Filesize

    416KB

  • memory/3720-117-0x0000000000000000-mapping.dmp