Analysis
-
max time kernel
4294179s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
26-03-2022 16:43
Static task
static1
Behavioral task
behavioral1
Sample
da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe
Resource
win10v2004-en-20220113
General
-
Target
da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe
-
Size
837KB
-
MD5
fc4696e263fd29642a491cd5911a41d1
-
SHA1
4d1b49c670ac548ac46380194f65f268354eb013
-
SHA256
da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7
-
SHA512
2e458a15ba86b95867f1f45f6743ddd94119f45235411a5d8adb66b3480b517ca2962ccace09478978e47749211367830c9231ff7239d074eb963f745e8b98b4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exepid process 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exedescription pid process Token: SeDebugPrivilege 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exedescription pid process target process PID 1564 wrote to memory of 432 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe schtasks.exe PID 1564 wrote to memory of 432 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe schtasks.exe PID 1564 wrote to memory of 432 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe schtasks.exe PID 1564 wrote to memory of 432 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe schtasks.exe PID 1564 wrote to memory of 360 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 360 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 360 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 360 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1848 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1848 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1848 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1848 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1824 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1824 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1824 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1824 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1820 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1820 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1820 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1820 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1456 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1456 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1456 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe PID 1564 wrote to memory of 1456 1564 da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe"C:\Users\Admin\AppData\Local\Temp\da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GfhsaeruF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF161.tmp"2⤵
- Creates scheduled task(s)
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe"{path}"2⤵PID:360
-
-
C:\Users\Admin\AppData\Local\Temp\da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe"{path}"2⤵PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe"{path}"2⤵PID:1824
-
-
C:\Users\Admin\AppData\Local\Temp\da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe"{path}"2⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\da61f09c2679cae39e07c5ec3f8c271232ced03582a4bd4d5eec9563040228e7.exe"{path}"2⤵PID:1456
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5166ffc1bde89365fa634426b9e761faf
SHA17812930cfbdca20a5a3d801ca10b753867af9d75
SHA2560746d631efc0d42d12d2805ec4a1a6afba5a519f783f48f9038b9d659eb0ed14
SHA512bf4148b43eb15ca86451b833bbdb7c8b8cdc9e9699d93f3269a6170f5b4f8d4939a0037f9a11167a35957c4095c7ffebec843015d514b2182a9e6d833aca6449