Analysis
-
max time kernel
36s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30/05/2022, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe
Resource
win10v2004-20220414-en
General
-
Target
0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe
-
Size
664KB
-
MD5
2eef8b25420dbf133a3b9414bf51cb23
-
SHA1
f839d4f558d20e9a4d7964f59497641a5a097158
-
SHA256
0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80
-
SHA512
bb468bf7c3c281dc34f4e27755d19fef455aee11e19e70b79284eaae001033e0f5d3e2f35c5d8023577a4e360a5d302eec6f8e8af9fd0d331426292deec16e3f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1120 0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe 1120 0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe 1120 0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1812 1120 0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe 29 PID 1120 wrote to memory of 1812 1120 0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe 29 PID 1120 wrote to memory of 1812 1120 0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe 29 PID 1120 wrote to memory of 1812 1120 0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe"C:\Users\Admin\AppData\Local\Temp\0be743ff728ebbccd5db21b81ce1d2a0ca990c0aaa1d4bb40af953b7dbab1d80.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1812
-