Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
11-11-2021 12:24
Static task
static1
Behavioral task
behavioral1
Sample
99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff.exe
Resource
win10-en-20211104
General
-
Target
99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff.exe
-
Size
11.7MB
-
MD5
0013ee610f83b401007adbefef051305
-
SHA1
f322e18219aa1abd91640b4d2b47fc1992068d16
-
SHA256
99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff
-
SHA512
27abdf3bd117cd85e18d633ddcb35586791cc7f41caf9797fdbdc726befd140c8dbd2a3a3a032581f1f20e226b6f29327a6f9892255ab6b69c27d1e13719fe5b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4080 difserver.exe -
Loads dropped DLL 1 IoCs
pid Process 4080 difserver.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4080 difserver.exe 4080 difserver.exe 4080 difserver.exe 4080 difserver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4080 difserver.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4080 difserver.exe 4080 difserver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 516 wrote to memory of 4080 516 99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff.exe 69 PID 516 wrote to memory of 4080 516 99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff.exe 69 PID 516 wrote to memory of 4080 516 99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff.exe"C:\Users\Admin\AppData\Local\Temp\99e6b46a1eba6fd60b9568622a2a27b4ae1ac02e55ab8b13709f38455345aaff.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Roaming\Diffractor\Virtual Diffractor Server\difserver.exe"C:\Users\Admin\AppData\Roaming\Diffractor\Virtual Diffractor Server\difserver.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4080
-