Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14/12/2021, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
SUPLY.cmd.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SUPLY.cmd.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
SUPLY.cmd.exe
-
Size
1.5MB
-
MD5
a6395684ced7f9127f03f17bd263f6fd
-
SHA1
bcd96892630129da75b2faefc7dbf6fcad90c552
-
SHA256
002f0bfd7f0c174e11f976f38861391e8f9eff093e8c3e36e01d811451c63ebd
-
SHA512
6e2fb4e4fb122713da25523a861cb8ede4ccceaa8844462d17177c7fb7b9e7d1161cc0324b73b3667ddf4156a2305e670425ad58914568377185aaad1b8dd924
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 920 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1676 SUPLY.cmd.exe 1676 SUPLY.cmd.exe 1676 SUPLY.cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1676 wrote to memory of 524 1676 SUPLY.cmd.exe 28 PID 1676 wrote to memory of 524 1676 SUPLY.cmd.exe 28 PID 1676 wrote to memory of 524 1676 SUPLY.cmd.exe 28 PID 1676 wrote to memory of 524 1676 SUPLY.cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SUPLY.cmd.exe"C:\Users\Admin\AppData\Local\Temp\SUPLY.cmd.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\Receipt.bmp2⤵PID:524
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:920