Analysis
-
max time kernel
74s -
max time network
24s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
03-10-2021 06:47
Static task
static1
Behavioral task
behavioral1
Sample
Ref 2998390020 purchasing inquiry.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
General
-
Target
Ref 2998390020 purchasing inquiry.exe
-
Size
442KB
-
MD5
4db15735772716ead8b0a838c67f91c6
-
SHA1
e7770b8a8d3d092f3bd38de265890f6cf17d1406
-
SHA256
5d65c8c1dbe91d020fe6dfefe37ef17651aaead257fdd7f24aa08b9a38cbb8fc
-
SHA512
38f0d118a3dfdb2ca0a0fd64b23cde9cdd76c410b85fa1f69dd164b121a25c213ea5dff75a7ab658c57cd5b7822cc16f7e19bcdeb63d202271065147cb22cc4c
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Ref 2998390020 purchasing inquiry.exepid process 1500 Ref 2998390020 purchasing inquiry.exe 1500 Ref 2998390020 purchasing inquiry.exe 1500 Ref 2998390020 purchasing inquiry.exe 1500 Ref 2998390020 purchasing inquiry.exe 1500 Ref 2998390020 purchasing inquiry.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Ref 2998390020 purchasing inquiry.exedescription pid process Token: SeDebugPrivilege 1500 Ref 2998390020 purchasing inquiry.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Ref 2998390020 purchasing inquiry.exedescription pid process target process PID 1500 wrote to memory of 776 1500 Ref 2998390020 purchasing inquiry.exe schtasks.exe PID 1500 wrote to memory of 776 1500 Ref 2998390020 purchasing inquiry.exe schtasks.exe PID 1500 wrote to memory of 776 1500 Ref 2998390020 purchasing inquiry.exe schtasks.exe PID 1500 wrote to memory of 776 1500 Ref 2998390020 purchasing inquiry.exe schtasks.exe PID 1500 wrote to memory of 1756 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1756 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1756 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1756 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1564 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1564 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1564 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1564 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1604 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1604 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1604 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1604 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 676 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 676 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 676 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 676 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1880 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1880 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1880 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe PID 1500 wrote to memory of 1880 1500 Ref 2998390020 purchasing inquiry.exe Ref 2998390020 purchasing inquiry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vDOhzfeKq" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3429.tmp"2⤵
- Creates scheduled task(s)
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"2⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"2⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"2⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"2⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Ref 2998390020 purchasing inquiry.exe"2⤵PID:1880