Resubmissions
03/02/2022, 13:19
220203-qkn47ahgap 801/02/2022, 11:22
220201-ngzemsdehk 1005/01/2022, 09:55
220105-lxw84sabh4 10Analysis
-
max time kernel
129s -
max time network
132s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
03/02/2022, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
hbatka.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
hbatka.exe
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
-
Target
hbatka.exe
-
Size
75KB
-
MD5
a765dbcbac57a712e2eb748fe6fd5e7c
-
SHA1
59c51f9d5f699b6aa6b3e37fcd93da87ce79d815
-
SHA256
7e6cd2bf820d81c9389c549cfe482bcdb1b57c5f39d53b63cd1efb79699e7ae6
-
SHA512
9ab1aa09e965014b56aadeddbe38b44de343942857431b6490a53b143b9232f6da3415d6245ee774a35538196ad000c66fdc673db98fb84bd7615af04a7e1a8c
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1652 1996 WerFault.exe 18 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1612 powershell.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1996 hbatka.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeDebugPrivilege 1652 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1612 1996 hbatka.exe 27 PID 1996 wrote to memory of 1612 1996 hbatka.exe 27 PID 1996 wrote to memory of 1612 1996 hbatka.exe 27 PID 1996 wrote to memory of 1612 1996 hbatka.exe 27 PID 1996 wrote to memory of 1652 1996 hbatka.exe 31 PID 1996 wrote to memory of 1652 1996 hbatka.exe 31 PID 1996 wrote to memory of 1652 1996 hbatka.exe 31 PID 1996 wrote to memory of 1652 1996 hbatka.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\hbatka.exe"C:\Users\Admin\AppData\Local\Temp\hbatka.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 12402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652
-