Resubmissions
03/02/2022, 13:19
220203-qkn47ahgap 801/02/2022, 11:22
220201-ngzemsdehk 1005/01/2022, 09:55
220105-lxw84sabh4 10Analysis
-
max time kernel
123s -
max time network
141s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
01/02/2022, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
hbatka.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
hbatka.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
hbatka.exe
-
Size
75KB
-
MD5
a765dbcbac57a712e2eb748fe6fd5e7c
-
SHA1
59c51f9d5f699b6aa6b3e37fcd93da87ce79d815
-
SHA256
7e6cd2bf820d81c9389c549cfe482bcdb1b57c5f39d53b63cd1efb79699e7ae6
-
SHA512
9ab1aa09e965014b56aadeddbe38b44de343942857431b6490a53b143b9232f6da3415d6245ee774a35538196ad000c66fdc673db98fb84bd7615af04a7e1a8c
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1016 1256 WerFault.exe 11 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 548 powershell.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1256 hbatka.exe Token: SeDebugPrivilege 548 powershell.exe Token: SeDebugPrivilege 1016 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1256 wrote to memory of 548 1256 hbatka.exe 27 PID 1256 wrote to memory of 548 1256 hbatka.exe 27 PID 1256 wrote to memory of 548 1256 hbatka.exe 27 PID 1256 wrote to memory of 548 1256 hbatka.exe 27 PID 1256 wrote to memory of 1016 1256 hbatka.exe 31 PID 1256 wrote to memory of 1016 1256 hbatka.exe 31 PID 1256 wrote to memory of 1016 1256 hbatka.exe 31 PID 1256 wrote to memory of 1016 1256 hbatka.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\hbatka.exe"C:\Users\Admin\AppData\Local\Temp\hbatka.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 12362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-