Analysis
-
max time kernel
4294180s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
25/03/2022, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe
Resource
win10v2004-en-20220113
General
-
Target
3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe
-
Size
1.5MB
-
MD5
764cae302cdcf344a2be7b2eb195bc6d
-
SHA1
50b434aa5b6268d94f0f607b17c3ad90b56d5f49
-
SHA256
3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79
-
SHA512
88c9d18a56fbe5e7402e61d481807295b24c6c0c2f0d154112a734a9353f96d7568e102105df8dfdfbe1aefdc82894e67e242d2db979662fb87af47186331dc9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1480 DllHost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 576 3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe 576 3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe 576 3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 576 wrote to memory of 2016 576 3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe 28 PID 576 wrote to memory of 2016 576 3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe 28 PID 576 wrote to memory of 2016 576 3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe 28 PID 576 wrote to memory of 2016 576 3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe"C:\Users\Admin\AppData\Local\Temp\3736619db77f19cc9a6004c92a4253587939bad1a20cbb7f1ac8f9b409950b79.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\RECEIPT.bmp2⤵PID:2016
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1480