Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-01-2022 16:15
Static task
static1
Behavioral task
behavioral1
Sample
379ebead1fb22627691fbd82cdc97817.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
379ebead1fb22627691fbd82cdc97817.exe
Resource
win10v2004-en-20220113
General
-
Target
379ebead1fb22627691fbd82cdc97817.exe
-
Size
425KB
-
MD5
379ebead1fb22627691fbd82cdc97817
-
SHA1
9c8d1836d857ea0368fcc882b6b089900f203e08
-
SHA256
1a10164e5cdc3ddbc96e75468254a421b1646b24934a6bde3313229fc6f26f0e
-
SHA512
1be3d939a8dbb1a8bb44d56239aa1474e7f0123b40289747a3a0bb7dfc9fb0a581dca0752f6d26518e7d9e745d654e52a82809cec1afbafb285a044f6cae728c
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1692-57-0x0000000000220000-0x000000000026C000-memory.dmp family_onlylogger behavioral1/memory/1692-58-0x0000000000400000-0x000000000057A000-memory.dmp family_onlylogger -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 380 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid Process 268 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid Process Token: SeDebugPrivilege 268 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
379ebead1fb22627691fbd82cdc97817.execmd.exedescription pid Process procid_target PID 1692 wrote to memory of 380 1692 379ebead1fb22627691fbd82cdc97817.exe 27 PID 1692 wrote to memory of 380 1692 379ebead1fb22627691fbd82cdc97817.exe 27 PID 1692 wrote to memory of 380 1692 379ebead1fb22627691fbd82cdc97817.exe 27 PID 1692 wrote to memory of 380 1692 379ebead1fb22627691fbd82cdc97817.exe 27 PID 380 wrote to memory of 268 380 cmd.exe 29 PID 380 wrote to memory of 268 380 cmd.exe 29 PID 380 wrote to memory of 268 380 cmd.exe 29 PID 380 wrote to memory of 268 380 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\379ebead1fb22627691fbd82cdc97817.exe"C:\Users\Admin\AppData\Local\Temp\379ebead1fb22627691fbd82cdc97817.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "379ebead1fb22627691fbd82cdc97817.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\379ebead1fb22627691fbd82cdc97817.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "379ebead1fb22627691fbd82cdc97817.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-