Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-01-2022 11:27
Static task
static1
Behavioral task
behavioral1
Sample
2b42a9613d2132e3fcc1f7fbac390b24.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2b42a9613d2132e3fcc1f7fbac390b24.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
2b42a9613d2132e3fcc1f7fbac390b24.exe
-
Size
253KB
-
MD5
2b42a9613d2132e3fcc1f7fbac390b24
-
SHA1
adb4bf1e2d2085f0ee54e467fdeba042c2276964
-
SHA256
cce1cf601e23728f6783f55bbe926ef4be018bbaf2c65698423e347fcdd9778d
-
SHA512
e60c2b318ed699cdc75eace766e4d570a8809fe7b9f64eb0e4a4141d10179b282c97f330965f5a0b99019abe7326665dbfbe36de2f60a2933bf8eadaae727c01
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 4084 timeout.exe 960 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2b42a9613d2132e3fcc1f7fbac390b24.exedescription pid process Token: SeDebugPrivilege 2784 2b42a9613d2132e3fcc1f7fbac390b24.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2b42a9613d2132e3fcc1f7fbac390b24.execmd.execmd.exedescription pid process target process PID 2784 wrote to memory of 2716 2784 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 2784 wrote to memory of 2716 2784 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 2784 wrote to memory of 2716 2784 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 2716 wrote to memory of 4084 2716 cmd.exe timeout.exe PID 2716 wrote to memory of 4084 2716 cmd.exe timeout.exe PID 2716 wrote to memory of 4084 2716 cmd.exe timeout.exe PID 2784 wrote to memory of 1332 2784 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 2784 wrote to memory of 1332 2784 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 2784 wrote to memory of 1332 2784 2b42a9613d2132e3fcc1f7fbac390b24.exe cmd.exe PID 1332 wrote to memory of 960 1332 cmd.exe timeout.exe PID 1332 wrote to memory of 960 1332 cmd.exe timeout.exe PID 1332 wrote to memory of 960 1332 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b42a9613d2132e3fcc1f7fbac390b24.exe"C:\Users\Admin\AppData\Local\Temp\2b42a9613d2132e3fcc1f7fbac390b24.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 102⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 102⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe