Analysis
-
max time kernel
110s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 13:19
Static task
static1
Behavioral task
behavioral1
Sample
sample13.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sample13.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
sample13.exe
-
Size
37KB
-
MD5
2c7d4e78f74cc716f23492ad19daf763
-
SHA1
6ef7bfe52f66fb204b401aa7d280df124f3fa0e2
-
SHA256
f06b116d8af2db4ae345ed7c9596865c3476d401ff7d52b0a45478847f053ff1
-
SHA512
2e503be1721f52bffd2d426ed1fa24a7f8f412a78c15db4ec7fbff1df97622c3e1a540a1e1f45d4630faa8a7d5a565ba2cb9c4e713d3bc7a3e11cb50c9a613e8
Score
10/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2836-117-0x0000000000340000-0x0000000000350000-memory.dmp family_spyex -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 384 powershell.exe 3200 powershell.exe 908 powershell.exe 384 powershell.exe 908 powershell.exe 3200 powershell.exe 908 powershell.exe 384 powershell.exe 3200 powershell.exe 1912 powershell.exe 1912 powershell.exe 1912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3200 powershell.exe Token: SeDebugPrivilege 384 powershell.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeIncreaseQuotaPrivilege 384 powershell.exe Token: SeSecurityPrivilege 384 powershell.exe Token: SeTakeOwnershipPrivilege 384 powershell.exe Token: SeLoadDriverPrivilege 384 powershell.exe Token: SeSystemProfilePrivilege 384 powershell.exe Token: SeSystemtimePrivilege 384 powershell.exe Token: SeProfSingleProcessPrivilege 384 powershell.exe Token: SeIncBasePriorityPrivilege 384 powershell.exe Token: SeCreatePagefilePrivilege 384 powershell.exe Token: SeBackupPrivilege 384 powershell.exe Token: SeRestorePrivilege 384 powershell.exe Token: SeShutdownPrivilege 384 powershell.exe Token: SeDebugPrivilege 384 powershell.exe Token: SeSystemEnvironmentPrivilege 384 powershell.exe Token: SeRemoteShutdownPrivilege 384 powershell.exe Token: SeUndockPrivilege 384 powershell.exe Token: SeManageVolumePrivilege 384 powershell.exe Token: 33 384 powershell.exe Token: 34 384 powershell.exe Token: 35 384 powershell.exe Token: 36 384 powershell.exe Token: SeIncreaseQuotaPrivilege 3200 powershell.exe Token: SeSecurityPrivilege 3200 powershell.exe Token: SeTakeOwnershipPrivilege 3200 powershell.exe Token: SeLoadDriverPrivilege 3200 powershell.exe Token: SeSystemProfilePrivilege 3200 powershell.exe Token: SeSystemtimePrivilege 3200 powershell.exe Token: SeProfSingleProcessPrivilege 3200 powershell.exe Token: SeIncBasePriorityPrivilege 3200 powershell.exe Token: SeCreatePagefilePrivilege 3200 powershell.exe Token: SeBackupPrivilege 3200 powershell.exe Token: SeRestorePrivilege 3200 powershell.exe Token: SeShutdownPrivilege 3200 powershell.exe Token: SeDebugPrivilege 3200 powershell.exe Token: SeSystemEnvironmentPrivilege 3200 powershell.exe Token: SeRemoteShutdownPrivilege 3200 powershell.exe Token: SeUndockPrivilege 3200 powershell.exe Token: SeManageVolumePrivilege 3200 powershell.exe Token: 33 3200 powershell.exe Token: 34 3200 powershell.exe Token: 35 3200 powershell.exe Token: 36 3200 powershell.exe Token: SeIncreaseQuotaPrivilege 908 powershell.exe Token: SeSecurityPrivilege 908 powershell.exe Token: SeTakeOwnershipPrivilege 908 powershell.exe Token: SeLoadDriverPrivilege 908 powershell.exe Token: SeSystemProfilePrivilege 908 powershell.exe Token: SeSystemtimePrivilege 908 powershell.exe Token: SeProfSingleProcessPrivilege 908 powershell.exe Token: SeIncBasePriorityPrivilege 908 powershell.exe Token: SeCreatePagefilePrivilege 908 powershell.exe Token: SeBackupPrivilege 908 powershell.exe Token: SeRestorePrivilege 908 powershell.exe Token: SeShutdownPrivilege 908 powershell.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeSystemEnvironmentPrivilege 908 powershell.exe Token: SeRemoteShutdownPrivilege 908 powershell.exe Token: SeUndockPrivilege 908 powershell.exe Token: SeManageVolumePrivilege 908 powershell.exe Token: 33 908 powershell.exe Token: 34 908 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2836 wrote to memory of 908 2836 sample13.exe 70 PID 2836 wrote to memory of 908 2836 sample13.exe 70 PID 2836 wrote to memory of 908 2836 sample13.exe 70 PID 2836 wrote to memory of 3200 2836 sample13.exe 69 PID 2836 wrote to memory of 3200 2836 sample13.exe 69 PID 2836 wrote to memory of 3200 2836 sample13.exe 69 PID 2836 wrote to memory of 384 2836 sample13.exe 71 PID 2836 wrote to memory of 384 2836 sample13.exe 71 PID 2836 wrote to memory of 384 2836 sample13.exe 71 PID 2836 wrote to memory of 1912 2836 sample13.exe 76 PID 2836 wrote to memory of 1912 2836 sample13.exe 76 PID 2836 wrote to memory of 1912 2836 sample13.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample13.exe"C:\Users\Admin\AppData\Local\Temp\sample13.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.facebook.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.twitter.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-