Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
27-06-2022 18:39
Static task
static1
Behavioral task
behavioral1
Sample
878.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
878.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
demand_letter.jpg.lnk
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
demand_letter.jpg.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
vGhhsvfLkp.ps1
Resource
win7-20220414-en
General
-
Target
demand_letter.jpg.lnk
-
Size
1KB
-
MD5
d01dc2fbb602e1058ae56f07fe895513
-
SHA1
decf03519d25e17b858d398d299b082ecf7e1fd1
-
SHA256
1040fce86562017f6eea2e609d1e7a49e928d140ac0e3bb30fd290f2b29d117b
-
SHA512
da7e540394e342db69fefa0c84d55d20e96f4e1764bb32fd4f87bd332b22d6a8b8923453aad2ab1f478200797fbdc68b8eddb618a8e2bc8e813e9f6c1bf08365
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2044 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2044 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1180 wrote to memory of 2044 1180 cmd.exe powershell.exe PID 1180 wrote to memory of 2044 1180 cmd.exe powershell.exe PID 1180 wrote to memory of 2044 1180 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\demand_letter.jpg.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -w h -file vGhhsvfLkp.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044