Analysis
-
max time kernel
4294195s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
06-03-2022 16:25
Behavioral task
behavioral1
Sample
b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
General
-
Target
b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe
-
Size
38KB
-
MD5
243972754a00487c8e91500af011f4f4
-
SHA1
8d4114b6c35df2ff942e365ebbe6fc2dbb8be4e8
-
SHA256
b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad
-
SHA512
a6eb3b5ca966aae5bde31dcef13e6b08c868719572024880672b8798b5ba64c1e187d88de9cf5bdf5fcdd430dbb3c75db5d8c4dc28a46b8380cf43850d05ff88
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
KBDMLT48.exepid process 524 KBDMLT48.exe 524 KBDMLT48.exe 524 KBDMLT48.exe 524 KBDMLT48.exe 524 KBDMLT48.exe 524 KBDMLT48.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exepid process 1928 b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exedescription pid process target process PID 1928 wrote to memory of 524 1928 b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe KBDMLT48.exe PID 1928 wrote to memory of 524 1928 b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe KBDMLT48.exe PID 1928 wrote to memory of 524 1928 b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe KBDMLT48.exe PID 1928 wrote to memory of 524 1928 b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe KBDMLT48.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe"C:\Users\Admin\AppData\Local\Temp\b36fcd01684ee655f8a546aa7a6993f0a0796340dcc8c191eb8b18364c6bb8ad.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\KBDMLT48\KBDMLT48.exe"C:\Windows\SysWOW64\KBDMLT48\KBDMLT48.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1928-54-0x00000000757C1000-0x00000000757C3000-memory.dmpFilesize
8KB