Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 02:32
Static task
static1
Behavioral task
behavioral1
Sample
336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe
-
Size
160KB
-
MD5
4e13fd1ecd6a94ad4dea73cac694cccf
-
SHA1
2e27c287865911827319f010fd00830f1bb687cc
-
SHA256
336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583
-
SHA512
b132069841259b4569d0ea2a934e5f569327ce2c6dda0805a776d5dd79202290b8133e816a8c0dae5be2cf814e3bbeab7fcc6b30dff660ed57f41adc085ac32f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2316 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 2316 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 3524 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 3524 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 4652 defineadam.exe 4652 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe 2152 defineadam.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3524 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3524 2316 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 79 PID 2316 wrote to memory of 3524 2316 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 79 PID 2316 wrote to memory of 3524 2316 336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe 79 PID 4652 wrote to memory of 2152 4652 defineadam.exe 81 PID 4652 wrote to memory of 2152 4652 defineadam.exe 81 PID 4652 wrote to memory of 2152 4652 defineadam.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe"C:\Users\Admin\AppData\Local\Temp\336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe"C:\Users\Admin\AppData\Local\Temp\336636f33e83a65d90de58460b62f66b168933f3685680792991fb320d04e583.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3524
-
-
C:\Windows\SysWOW64\defineadam.exe"C:\Windows\SysWOW64\defineadam.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\defineadam.exe"C:\Windows\SysWOW64\defineadam.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-