Analysis

  • max time kernel
    157s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    05-02-2022 15:16

General

  • Target

    5d38ebafe05f6b9a2a94dd107bdda796b33563865ca6a1b9e562bcea63526a8e.exe

  • Size

    70KB

  • MD5

    fa7bc80be251a4ab8f68be18149b50f1

  • SHA1

    eeed35174700516ad6d500b7976d3ff86582579c

  • SHA256

    5d38ebafe05f6b9a2a94dd107bdda796b33563865ca6a1b9e562bcea63526a8e

  • SHA512

    e1828e9e20cbb9fd06d2addf446b957ccce96739adb286bc57c68f0b23269ec1ac27b7e0e14d96718b405834d117e56db9cd1c8bcc739b8d650f58e5b74e4ee9

Score
10/10

Malware Config

Signatures

  • Balaclava Malware

    Balaclava malware is a ransomware program.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d38ebafe05f6b9a2a94dd107bdda796b33563865ca6a1b9e562bcea63526a8e.exe
    "C:\Users\Admin\AppData\Local\Temp\5d38ebafe05f6b9a2a94dd107bdda796b33563865ca6a1b9e562bcea63526a8e.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:4756
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1346565761-3498240568-4147300184-1000\desktop.ini

    MD5

    a7a2139059f03ffb3402309f35cc2e04

    SHA1

    8abcbe25488c96c1a5887d5628d57db6e0cedc0d

    SHA256

    24168f0be075da61de9289152f765bbad9e09b515f54344fb9fddb2b233e9a56

    SHA512

    ff8dfe2e240b468b6acf493de8daf49346c5f9965daebbc46cfc1b0aaca9c6d3a1acdbe340ff4151dd0a2d0f02a1669c272d05327f274b8de82f3b62474e2eae

  • memory/1748-131-0x00000244E6F80000-0x00000244E6F90000-memory.dmp

    Filesize

    64KB

  • memory/1748-138-0x00000244EA360000-0x00000244EA364000-memory.dmp

    Filesize

    16KB