Analysis
-
max time kernel
47s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-05-2022 05:17
Static task
static1
Behavioral task
behavioral1
Sample
c5097f98c49b1a92ae0cb6171a63b42d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c5097f98c49b1a92ae0cb6171a63b42d.exe
Resource
win10v2004-20220414-en
General
-
Target
c5097f98c49b1a92ae0cb6171a63b42d.exe
-
Size
1.7MB
-
MD5
c5097f98c49b1a92ae0cb6171a63b42d
-
SHA1
88f2248464b44c0916e504a2bceee893445cc018
-
SHA256
32bf6396ba19b940a778f7ab4f62dd79ac1ddbf65524f9c11631b0f7690af0bc
-
SHA512
49fad1ea39107ba36b7940b82d5f54e02c87f45ddecdbdf1f70bd27d804086fa168b0b429b92e53529feb1db08dd1f27510898d3ca29f69fb831ffbcb13cc19a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1688 Componenthost.exe -
Loads dropped DLL 2 IoCs
pid Process 1488 cmd.exe 1488 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1688 Componenthost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1640 2004 c5097f98c49b1a92ae0cb6171a63b42d.exe 28 PID 2004 wrote to memory of 1640 2004 c5097f98c49b1a92ae0cb6171a63b42d.exe 28 PID 2004 wrote to memory of 1640 2004 c5097f98c49b1a92ae0cb6171a63b42d.exe 28 PID 2004 wrote to memory of 1640 2004 c5097f98c49b1a92ae0cb6171a63b42d.exe 28 PID 1640 wrote to memory of 1488 1640 WScript.exe 29 PID 1640 wrote to memory of 1488 1640 WScript.exe 29 PID 1640 wrote to memory of 1488 1640 WScript.exe 29 PID 1640 wrote to memory of 1488 1640 WScript.exe 29 PID 1488 wrote to memory of 1688 1488 cmd.exe 31 PID 1488 wrote to memory of 1688 1488 cmd.exe 31 PID 1488 wrote to memory of 1688 1488 cmd.exe 31 PID 1488 wrote to memory of 1688 1488 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5097f98c49b1a92ae0cb6171a63b42d.exe"C:\Users\Admin\AppData\Local\Temp\c5097f98c49b1a92ae0cb6171a63b42d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\reviewsession\zAvG1KO.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\reviewsession\7STcmfjAW.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\reviewsession\Componenthost.exe"C:\reviewsession\Componenthost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47B
MD5eaf2aeee3c0af2abf7be90d5c22e1d32
SHA1b8fbefc94fd39337c2bf217871c2c7a02f84c7d4
SHA25661e1ff88b2cee31c8785a632ddb5d9bf80c85c3b073a3fd200e2307958d516d5
SHA512d2d51515cbfada7839c688f9a736555da9f3459e957b3a23d41fdb7545539381b5e548cd64bc14f478cd70ae48b6b1d48192dda90dddab6f1eb960b101af8e0e
-
Filesize
1.4MB
MD5126c2a884085e32f86ff4deb9fdc05cb
SHA1fd4a7752bec9d3ed9ddd8caa97fdcca84a408fb4
SHA256951da0c5e00929fccc85508b71545b79717f9ccade9225051124c3d3fc5a858f
SHA512824f203cb13682f0f511021cda1557205f112ff8832ace651277301a11e4e6d99721a2aab9b3c901f7ab7f13aa35f64b0d0abcbf1f7b4f0c533a596e61081e3c
-
Filesize
1.4MB
MD5126c2a884085e32f86ff4deb9fdc05cb
SHA1fd4a7752bec9d3ed9ddd8caa97fdcca84a408fb4
SHA256951da0c5e00929fccc85508b71545b79717f9ccade9225051124c3d3fc5a858f
SHA512824f203cb13682f0f511021cda1557205f112ff8832ace651277301a11e4e6d99721a2aab9b3c901f7ab7f13aa35f64b0d0abcbf1f7b4f0c533a596e61081e3c
-
Filesize
210B
MD5d51938e9e3e392c7304d2d9946b98b47
SHA15ae9bfb7be659102507e368e051aa6ccf1c0bd4e
SHA256ae4d75a6e3d65b854e5fc1b37d9637251db25a3f5b7e5275705c426a69c26061
SHA512ab262c582e35cd235f800b65690a70d761d321088847d1db216857a62751b41efc879f8228793eee8080961f13b878363f188520c264b70b36d3f53039cbbe4e
-
Filesize
1.4MB
MD5126c2a884085e32f86ff4deb9fdc05cb
SHA1fd4a7752bec9d3ed9ddd8caa97fdcca84a408fb4
SHA256951da0c5e00929fccc85508b71545b79717f9ccade9225051124c3d3fc5a858f
SHA512824f203cb13682f0f511021cda1557205f112ff8832ace651277301a11e4e6d99721a2aab9b3c901f7ab7f13aa35f64b0d0abcbf1f7b4f0c533a596e61081e3c
-
Filesize
1.4MB
MD5126c2a884085e32f86ff4deb9fdc05cb
SHA1fd4a7752bec9d3ed9ddd8caa97fdcca84a408fb4
SHA256951da0c5e00929fccc85508b71545b79717f9ccade9225051124c3d3fc5a858f
SHA512824f203cb13682f0f511021cda1557205f112ff8832ace651277301a11e4e6d99721a2aab9b3c901f7ab7f13aa35f64b0d0abcbf1f7b4f0c533a596e61081e3c