Analysis
-
max time kernel
133s -
max time network
59s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
23-09-2021 13:59
Static task
static1
Behavioral task
behavioral1
Sample
ApowerREC.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ApowerREC.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
ApowerREC.exe
-
Size
8.9MB
-
MD5
810be064429970190268a24af354a2f1
-
SHA1
f5e17599a9c30a9eada1dcb276b888bdeffd037d
-
SHA256
7edf30b359be3f27c9e7313352bc2d4cccb0e36010b34633646ea4823a70a82b
-
SHA512
d385f16cb89fff66926770768d34686963dededf2fe47cb3889fc1ab9ae791c9067b76d78d0f5b58f2a29d9bdb2e709a672d560c97cf34e1834230b322c157b0
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ApowerREC.exedescription pid Process procid_target PID 784 set thread context of 1252 784 ApowerREC.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ApowerREC.exedescription pid Process Token: SeDebugPrivilege 784 ApowerREC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ApowerREC.exedescription pid Process procid_target PID 784 wrote to memory of 1140 784 ApowerREC.exe 27 PID 784 wrote to memory of 1140 784 ApowerREC.exe 27 PID 784 wrote to memory of 1140 784 ApowerREC.exe 27 PID 784 wrote to memory of 1140 784 ApowerREC.exe 27 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29 PID 784 wrote to memory of 1252 784 ApowerREC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe"C:\Users\Admin\AppData\Local\Temp\ApowerREC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c2⤵PID:1140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1252
-