Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-01-2022 08:40
Static task
static1
Behavioral task
behavioral1
Sample
084867eab2023c445721b0cd205ce47a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
084867eab2023c445721b0cd205ce47a.exe
Resource
win10v2004-en-20220113
General
-
Target
084867eab2023c445721b0cd205ce47a.exe
-
Size
419KB
-
MD5
084867eab2023c445721b0cd205ce47a
-
SHA1
0f465ee53425b4c9a963f6ecfe1119840fa810d7
-
SHA256
5d9dc24f2de724f0921574f0589d39f79cbdd85cc817a6345267aa9aa9632a2b
-
SHA512
58ec053935a7d8e2f206f3ecf76ab575dcf95736f1f23c2b8944ff4e5c31b3f6faaef20cd959a8206003c298e82770f456261a3122f815dd6347f08dd1992c3c
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/832-55-0x00000000002A0000-0x00000000002EC000-memory.dmp family_onlylogger behavioral1/memory/832-56-0x0000000000400000-0x0000000000579000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 948 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 464 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 464 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
084867eab2023c445721b0cd205ce47a.execmd.exedescription pid process target process PID 832 wrote to memory of 948 832 084867eab2023c445721b0cd205ce47a.exe cmd.exe PID 832 wrote to memory of 948 832 084867eab2023c445721b0cd205ce47a.exe cmd.exe PID 832 wrote to memory of 948 832 084867eab2023c445721b0cd205ce47a.exe cmd.exe PID 832 wrote to memory of 948 832 084867eab2023c445721b0cd205ce47a.exe cmd.exe PID 948 wrote to memory of 464 948 cmd.exe taskkill.exe PID 948 wrote to memory of 464 948 cmd.exe taskkill.exe PID 948 wrote to memory of 464 948 cmd.exe taskkill.exe PID 948 wrote to memory of 464 948 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\084867eab2023c445721b0cd205ce47a.exe"C:\Users\Admin\AppData\Local\Temp\084867eab2023c445721b0cd205ce47a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "084867eab2023c445721b0cd205ce47a.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\084867eab2023c445721b0cd205ce47a.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "084867eab2023c445721b0cd205ce47a.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-