Analysis
-
max time kernel
146s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 08:21
Static task
static1
Behavioral task
behavioral1
Sample
46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe
-
Size
304KB
-
MD5
d01c6c9d0ee7718220385bb50e674979
-
SHA1
5f173f9d3898427109863869f412071bb3983add
-
SHA256
46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1
-
SHA512
e781569b628b7b4dbd2f2be4a7d1222dfd9861a93e9c78cb7837dc6caa2319f06339b5a199e92d7af16aa85a30bf03d3c073409392086012a358df1d1446614a
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe:Zone.Identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exedescription pid process Token: SeDebugPrivilege 1448 46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exedescription pid process target process PID 1448 wrote to memory of 960 1448 46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe cmd.exe PID 1448 wrote to memory of 960 1448 46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe cmd.exe PID 1448 wrote to memory of 960 1448 46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe cmd.exe PID 1448 wrote to memory of 960 1448 46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe"C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\46935cf2f929d8e0466eb12af6bc0ecd4251d48c938a1d7fb1041fbefd44cda1.exe:Zone.Identifier"2⤵
- NTFS ADS
PID:960