Analysis
-
max time kernel
82s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
26-02-2022 07:49
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-en-20220112
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
tmp.exe
-
Size
652KB
-
MD5
5dfc3eefe1c51312d0020910020c4025
-
SHA1
8e6ab92a5d138b3f997ee0a12bb2438e82236760
-
SHA256
7cff549b9b283c2124a963526762625ac3a476ced39bab1afb2cf1accd3249d0
-
SHA512
6be0d92564a380dff41d2960d32e17fe81c0340dbb09a1207a109fa0f584a75e066bbc3a26f5d53f4a62037fd09938a3729d2f595100c7b26bacea38e5e4a6cd
Score
6/10
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tmp.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName tmp.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe 3352 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3352 tmp.exe Token: SeIncBasePriorityPrivilege 3352 tmp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3352 tmp.exe 3352 tmp.exe