Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-01-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe
-
Size
253KB
-
MD5
2b42a9613d2132e3fcc1f7fbac390b24
-
SHA1
adb4bf1e2d2085f0ee54e467fdeba042c2276964
-
SHA256
cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d
-
SHA512
e60c2b318ed699cdc75eace766e4d570a8809fe7b9f64eb0e4a4141d10179b282c97f330965f5a0b99019abe7326665dbfbe36de2f60a2933bf8eadaae727c01
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 644 timeout.exe 420 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exedescription pid process Token: SeDebugPrivilege 2672 cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.execmd.execmd.exedescription pid process target process PID 2672 wrote to memory of 3440 2672 cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe cmd.exe PID 2672 wrote to memory of 3440 2672 cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe cmd.exe PID 2672 wrote to memory of 3440 2672 cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe cmd.exe PID 3440 wrote to memory of 644 3440 cmd.exe timeout.exe PID 3440 wrote to memory of 644 3440 cmd.exe timeout.exe PID 3440 wrote to memory of 644 3440 cmd.exe timeout.exe PID 2672 wrote to memory of 1352 2672 cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe cmd.exe PID 2672 wrote to memory of 1352 2672 cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe cmd.exe PID 2672 wrote to memory of 1352 2672 cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe cmd.exe PID 1352 wrote to memory of 420 1352 cmd.exe timeout.exe PID 1352 wrote to memory of 420 1352 cmd.exe timeout.exe PID 1352 wrote to memory of 420 1352 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe"C:\Users\Admin\AppData\Local\Temp\cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 102⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 102⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe