Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11/05/2022, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe
Resource
win10v2004-20220414-en
General
-
Target
32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe
-
Size
476KB
-
MD5
c30ac0d1938b1dd74d916afe47229c31
-
SHA1
52521e420188a45b984cb5fa36d262c3cfbd24e9
-
SHA256
32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a
-
SHA512
a2b7a7574fe190d406870c85281c7916b2d60b7cf823e327cdc5fe8176a65a92785377685f3a8d21d2bc61ab10198480c0c3cb37afc537c3213387d0f1d2f3e0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1944 32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe 1944 32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe 1944 32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1424 1944 32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe 28 PID 1944 wrote to memory of 1424 1944 32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe 28 PID 1944 wrote to memory of 1424 1944 32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe 28 PID 1944 wrote to memory of 1424 1944 32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe"C:\Users\Admin\AppData\Local\Temp\32d30d5e83b315a0d9cf0a4b49899a8e3af1e3cf875ed29794001f294a54750a.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1424
-