Analysis
-
max time kernel
127s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30/05/2022, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe
Resource
win7-20220414-en
General
-
Target
085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe
-
Size
1.0MB
-
MD5
630f1f1db8de6ebd3194537bcba93320
-
SHA1
e8d63e33bc211c4be7805401812b041c2b229ff7
-
SHA256
085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406
-
SHA512
c66e3404db29d5bbeab8b14b4428f83cf3472223f7ffafe165a3d4c2a8d0aa5d40c1127fd4ab4936b43ccff9d0298d0e82b8b01eda59ca5b2da238bdccc1e249
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 VGAuthService.exe -
Loads dropped DLL 1 IoCs
pid Process 1120 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\VGAuthService.exe\:Zone.Identifier:$DATA cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1732 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 27 PID 1972 wrote to memory of 1732 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 27 PID 1972 wrote to memory of 1732 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 27 PID 1972 wrote to memory of 1732 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 27 PID 1972 wrote to memory of 896 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 29 PID 1972 wrote to memory of 896 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 29 PID 1972 wrote to memory of 896 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 29 PID 1972 wrote to memory of 896 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 29 PID 1972 wrote to memory of 1120 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 31 PID 1972 wrote to memory of 1120 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 31 PID 1972 wrote to memory of 1120 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 31 PID 1972 wrote to memory of 1120 1972 085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe 31 PID 1120 wrote to memory of 1316 1120 cmd.exe 33 PID 1120 wrote to memory of 1316 1120 cmd.exe 33 PID 1120 wrote to memory of 1316 1120 cmd.exe 33 PID 1120 wrote to memory of 1316 1120 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe"C:\Users\Admin\AppData\Local\Temp\085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe:Zone.Identifier"2⤵
- NTFS ADS
PID:1732
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\VGAuthService.exe"2⤵
- NTFS ADS
PID:896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\VGAuthService.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\VGAuthService.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\VGAuthService.exe"3⤵
- Executes dropped EXE
PID:1316
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5630f1f1db8de6ebd3194537bcba93320
SHA1e8d63e33bc211c4be7805401812b041c2b229ff7
SHA256085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406
SHA512c66e3404db29d5bbeab8b14b4428f83cf3472223f7ffafe165a3d4c2a8d0aa5d40c1127fd4ab4936b43ccff9d0298d0e82b8b01eda59ca5b2da238bdccc1e249
-
Filesize
1.0MB
MD5630f1f1db8de6ebd3194537bcba93320
SHA1e8d63e33bc211c4be7805401812b041c2b229ff7
SHA256085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406
SHA512c66e3404db29d5bbeab8b14b4428f83cf3472223f7ffafe165a3d4c2a8d0aa5d40c1127fd4ab4936b43ccff9d0298d0e82b8b01eda59ca5b2da238bdccc1e249
-
Filesize
1.0MB
MD5630f1f1db8de6ebd3194537bcba93320
SHA1e8d63e33bc211c4be7805401812b041c2b229ff7
SHA256085af04b094fa4ace83e52e475d99fefd9050099dba73b11c63308920fb87406
SHA512c66e3404db29d5bbeab8b14b4428f83cf3472223f7ffafe165a3d4c2a8d0aa5d40c1127fd4ab4936b43ccff9d0298d0e82b8b01eda59ca5b2da238bdccc1e249