Analysis

  • max time kernel
    110s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    28-01-2022 13:19

General

  • Target

    sample13.exe

  • Size

    37KB

  • MD5

    2c7d4e78f74cc716f23492ad19daf763

  • SHA1

    6ef7bfe52f66fb204b401aa7d280df124f3fa0e2

  • SHA256

    f06b116d8af2db4ae345ed7c9596865c3476d401ff7d52b0a45478847f053ff1

  • SHA512

    2e503be1721f52bffd2d426ed1fa24a7f8f412a78c15db4ec7fbff1df97622c3e1a540a1e1f45d4630faa8a7d5a565ba2cb9c4e713d3bc7a3e11cb50c9a613e8

Score
10/10

Malware Config

Signatures

  • Detect A310Logger 1 IoCs

    Detect A310Logger SpyEx Variant.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample13.exe
    "C:\Users\Admin\AppData\Local\Temp\sample13.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3200
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:908
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.facebook.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:384
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.twitter.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/384-136-0x00000000075F0000-0x0000000007612000-memory.dmp

    Filesize

    136KB

  • memory/384-132-0x00000000071C0000-0x00000000071C1000-memory.dmp

    Filesize

    4KB

  • memory/384-163-0x00000000071C3000-0x00000000071C4000-memory.dmp

    Filesize

    4KB

  • memory/384-133-0x00000000071C2000-0x00000000071C3000-memory.dmp

    Filesize

    4KB

  • memory/384-157-0x0000000009520000-0x0000000009542000-memory.dmp

    Filesize

    136KB

  • memory/384-155-0x00000000097F0000-0x0000000009884000-memory.dmp

    Filesize

    592KB

  • memory/908-130-0x0000000003510000-0x0000000003536000-memory.dmp

    Filesize

    152KB

  • memory/908-162-0x0000000003510000-0x0000000003536000-memory.dmp

    Filesize

    152KB

  • memory/908-138-0x0000000007980000-0x00000000079E6000-memory.dmp

    Filesize

    408KB

  • memory/908-139-0x0000000008350000-0x00000000086A0000-memory.dmp

    Filesize

    3.3MB

  • memory/908-140-0x0000000008150000-0x000000000816C000-memory.dmp

    Filesize

    112KB

  • memory/908-128-0x0000000004F40000-0x0000000004F76000-memory.dmp

    Filesize

    216KB

  • memory/908-129-0x0000000007A80000-0x00000000080A8000-memory.dmp

    Filesize

    6.2MB

  • memory/908-135-0x0000000003510000-0x0000000003536000-memory.dmp

    Filesize

    152KB

  • memory/908-156-0x00000000098E0000-0x00000000098FA000-memory.dmp

    Filesize

    104KB

  • memory/1912-311-0x0000000007890000-0x0000000007BE0000-memory.dmp

    Filesize

    3.3MB

  • memory/1912-313-0x0000000001170000-0x0000000001171000-memory.dmp

    Filesize

    4KB

  • memory/1912-344-0x0000000001173000-0x0000000001174000-memory.dmp

    Filesize

    4KB

  • memory/1912-314-0x0000000001172000-0x0000000001173000-memory.dmp

    Filesize

    4KB

  • memory/2836-120-0x0000000004B30000-0x000000000502E000-memory.dmp

    Filesize

    5.0MB

  • memory/2836-121-0x0000000004B80000-0x0000000004B8A000-memory.dmp

    Filesize

    40KB

  • memory/2836-117-0x0000000000340000-0x0000000000350000-memory.dmp

    Filesize

    64KB

  • memory/2836-119-0x0000000004BD0000-0x0000000004C62000-memory.dmp

    Filesize

    584KB

  • memory/2836-118-0x0000000005030000-0x000000000552E000-memory.dmp

    Filesize

    5.0MB

  • memory/2836-394-0x0000000004B30000-0x000000000502E000-memory.dmp

    Filesize

    5.0MB

  • memory/3200-131-0x00000000012E0000-0x00000000012E1000-memory.dmp

    Filesize

    4KB

  • memory/3200-142-0x0000000008240000-0x00000000082B6000-memory.dmp

    Filesize

    472KB

  • memory/3200-141-0x00000000079B0000-0x00000000079FB000-memory.dmp

    Filesize

    300KB

  • memory/3200-137-0x0000000007760000-0x00000000077C6000-memory.dmp

    Filesize

    408KB

  • memory/3200-173-0x000000000A2B0000-0x000000000A928000-memory.dmp

    Filesize

    6.5MB

  • memory/3200-164-0x00000000012E3000-0x00000000012E4000-memory.dmp

    Filesize

    4KB

  • memory/3200-134-0x00000000012E2000-0x00000000012E3000-memory.dmp

    Filesize

    4KB