Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 17:00
Static task
static1
Behavioral task
behavioral1
Sample
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe
Resource
win10v2004-20220414-en
General
-
Target
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe
-
Size
132KB
-
MD5
61ddf7ff23b1e906bc39754e4eadaf44
-
SHA1
55a4d71f502392f29e734ebf3bac6fec2c91f07e
-
SHA256
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4
-
SHA512
e64d0673b39d19219ecdb8d938d933249df379d6006eb8ae0298e6695cf93106049f75d46adafbf05a3061fa72659743fb59d93021ba4a88e722c928c58e42ac
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exewfpslide.exewfpslide.exepid Process 4556 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 4556 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 3464 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 3464 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 3380 wfpslide.exe 3380 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe 908 wfpslide.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exepid Process 3464 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exewfpslide.exedescription pid Process procid_target PID 4556 wrote to memory of 3464 4556 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 80 PID 4556 wrote to memory of 3464 4556 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 80 PID 4556 wrote to memory of 3464 4556 3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe 80 PID 3380 wrote to memory of 908 3380 wfpslide.exe 86 PID 3380 wrote to memory of 908 3380 wfpslide.exe 86 PID 3380 wrote to memory of 908 3380 wfpslide.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe"C:\Users\Admin\AppData\Local\Temp\3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe"C:\Users\Admin\AppData\Local\Temp\3b483810130ab7c6bfa6625f45cafb070e793128a723c62d77c5598d2009a7e4.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3464
-
-
C:\Windows\SysWOW64\wfpslide.exe"C:\Windows\SysWOW64\wfpslide.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\wfpslide.exe"C:\Windows\SysWOW64\wfpslide.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-