Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 16:08
Static task
static1
Behavioral task
behavioral1
Sample
e2a6ef91a504d25344b262cbc9227dae.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e2a6ef91a504d25344b262cbc9227dae.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
e2a6ef91a504d25344b262cbc9227dae.exe
-
Size
391KB
-
MD5
e2a6ef91a504d25344b262cbc9227dae
-
SHA1
40c8d448535184d15911d92c604e664101a54795
-
SHA256
26d46c6b97e45b6d82e5c47ed3725fed18d6c9113b1f7bcbe5b880e562a95863
-
SHA512
d754847b86da66d4ef7d7cfe19ca436371dcda2c2417b1e915980f7bf3d51792846a733682f918879b7b42949f2593fa4de802a891d5ad268c9f647a5e9c6e83
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1148 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1172 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 1172 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e2a6ef91a504d25344b262cbc9227dae.execmd.exedescription pid process target process PID 1460 wrote to memory of 1148 1460 e2a6ef91a504d25344b262cbc9227dae.exe cmd.exe PID 1460 wrote to memory of 1148 1460 e2a6ef91a504d25344b262cbc9227dae.exe cmd.exe PID 1460 wrote to memory of 1148 1460 e2a6ef91a504d25344b262cbc9227dae.exe cmd.exe PID 1460 wrote to memory of 1148 1460 e2a6ef91a504d25344b262cbc9227dae.exe cmd.exe PID 1148 wrote to memory of 1172 1148 cmd.exe taskkill.exe PID 1148 wrote to memory of 1172 1148 cmd.exe taskkill.exe PID 1148 wrote to memory of 1172 1148 cmd.exe taskkill.exe PID 1148 wrote to memory of 1172 1148 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2a6ef91a504d25344b262cbc9227dae.exe"C:\Users\Admin\AppData\Local\Temp\e2a6ef91a504d25344b262cbc9227dae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "e2a6ef91a504d25344b262cbc9227dae.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\e2a6ef91a504d25344b262cbc9227dae.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "e2a6ef91a504d25344b262cbc9227dae.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-