Analysis
-
max time kernel
167s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
16-03-2022 05:38
Behavioral task
behavioral1
Sample
f115m.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
General
-
Target
f115m.exe
-
Size
62KB
-
MD5
d55debae7e5587c13005e43c05d2f1f0
-
SHA1
734d02cc5f9ca76ebc44084582af07997a657cb9
-
SHA256
f1159db89a9cc29443631e1381cad5f06bd1ec9158eccd77ea27123b83ce89a8
-
SHA512
076ae8b41d7fa125beb136d47c2cc4d790abbabc004019216aae2cba21d428561d602459b4184fa8e398f5b46078443e92a080cd72e892702422679c53917ff7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f115m.exepid process 1552 f115m.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f115m.exesmsallow.exedescription pid process target process PID 1244 wrote to memory of 1552 1244 f115m.exe f115m.exe PID 1244 wrote to memory of 1552 1244 f115m.exe f115m.exe PID 1244 wrote to memory of 1552 1244 f115m.exe f115m.exe PID 3508 wrote to memory of 3628 3508 smsallow.exe smsallow.exe PID 3508 wrote to memory of 3628 3508 smsallow.exe smsallow.exe PID 3508 wrote to memory of 3628 3508 smsallow.exe smsallow.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f115m.exe"C:\Users\Admin\AppData\Local\Temp\f115m.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\f115m.exe--a71d29222⤵
- Suspicious behavior: RenamesItself
PID:1552
-
-
C:\Windows\SysWOW64\smsallow.exe"C:\Windows\SysWOW64\smsallow.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\smsallow.exe--f4d16d422⤵PID:3628
-