Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-01-2022 08:34
Static task
static1
Behavioral task
behavioral1
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
425b312c607eaa405059b4928a65cba8.exe
Resource
win10v2004-en-20220113
General
-
Target
425b312c607eaa405059b4928a65cba8.exe
-
Size
420KB
-
MD5
425b312c607eaa405059b4928a65cba8
-
SHA1
3caefbcad6d742e8c1849ec2d8ce092c0c75152f
-
SHA256
ea25dcf8f74b1d1094825d695807839f48230a800420cd2c57a05f7f6fe5a5bb
-
SHA512
89d9c201da31815db48bbb0fea5268044a412dac91677f8d9fc9a7ff1b9eec9d0c8b3c864b340148a22cacbd6b2e3a37dbfd94170ccba3d059ee261c402d1fa6
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1212-56-0x0000000000400000-0x0000000000579000-memory.dmp family_onlylogger behavioral1/memory/1212-55-0x00000000002D0000-0x000000000031C000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1628 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 572 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 572 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
425b312c607eaa405059b4928a65cba8.execmd.exedescription pid process target process PID 1212 wrote to memory of 1628 1212 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 1212 wrote to memory of 1628 1212 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 1212 wrote to memory of 1628 1212 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 1212 wrote to memory of 1628 1212 425b312c607eaa405059b4928a65cba8.exe cmd.exe PID 1628 wrote to memory of 572 1628 cmd.exe taskkill.exe PID 1628 wrote to memory of 572 1628 cmd.exe taskkill.exe PID 1628 wrote to memory of 572 1628 cmd.exe taskkill.exe PID 1628 wrote to memory of 572 1628 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe"C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "425b312c607eaa405059b4928a65cba8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\425b312c607eaa405059b4928a65cba8.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "425b312c607eaa405059b4928a65cba8.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-