Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
05-07-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
7287387845476394829823.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
7287387845476394829823.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Case.pdf
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Case.pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
Case.pdf.lnk
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
Case.pdf.lnk
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
HDFcvLHBhKEQvBlli.ps1
Resource
win7-20220414-en
General
-
Target
Case.pdf.lnk
-
Size
2KB
-
MD5
81d3c327d043e682d692bad1326c29fa
-
SHA1
f6389335a6f1c6fecf60a5ce572f2611d01b5981
-
SHA256
4775f93534bca0f2efe8fbd2e6a67a98c8a6560e8ef6a9381802ef899ffbf4c4
-
SHA512
8c5bdd1e5d9c36814ae99f334e0f92ab406ed16b9db646901038fa2a8a81a24fcc9534902eb312b50af3fbc40e38d6e424e0673f48b006739508adfa6c7193bd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1428 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 872 wrote to memory of 1428 872 cmd.exe powershell.exe PID 872 wrote to memory of 1428 872 cmd.exe powershell.exe PID 872 wrote to memory of 1428 872 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Case.pdf.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -w h -file HDFcvLHBhKEQvBlli.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428