Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
25-01-2022 11:27
Static task
static1
Behavioral task
behavioral1
Sample
2b42a9613d2132e3fcc1f7fbac390b24.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2b42a9613d2132e3fcc1f7fbac390b24.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
2b42a9613d2132e3fcc1f7fbac390b24.exe
-
Size
253KB
-
MD5
2b42a9613d2132e3fcc1f7fbac390b24
-
SHA1
adb4bf1e2d2085f0ee54e467fdeba042c2276964
-
SHA256
cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d
-
SHA512
e60c2b318ed699cdc75eace766e4d570a8809fe7b9f64eb0e4a4141d10179b282c97f330965f5a0b99019abe7326665dbfbe36de2f60a2933bf8eadaae727c01
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1492 timeout.exe 1080 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2b42a9613d2132e3fcc1f7fbac390b24.exedescription pid process Token: SeDebugPrivilege 952 2b42a9613d2132e3fcc1f7fbac390b24.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
2b42a9613d2132e3fcc1f7fbac390b24.execmd.execmd.exedescription pid process target process PID 952 wrote to memory of 720 952 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 952 wrote to memory of 720 952 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 952 wrote to memory of 720 952 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 952 wrote to memory of 720 952 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 720 wrote to memory of 1492 720 cmd.exe timeout.exe PID 720 wrote to memory of 1492 720 cmd.exe timeout.exe PID 720 wrote to memory of 1492 720 cmd.exe timeout.exe PID 720 wrote to memory of 1492 720 cmd.exe timeout.exe PID 952 wrote to memory of 616 952 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 952 wrote to memory of 616 952 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 952 wrote to memory of 616 952 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 952 wrote to memory of 616 952 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 616 wrote to memory of 1080 616 cmd.exe timeout.exe PID 616 wrote to memory of 1080 616 cmd.exe timeout.exe PID 616 wrote to memory of 1080 616 cmd.exe timeout.exe PID 616 wrote to memory of 1080 616 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b42a9613d2132e3fcc1f7fbac390b24.exe"C:\Users\Admin\AppData\Local\Temp\2b42a9613d2132e3fcc1f7fbac390b24.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 102⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 102⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe