Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 16:20
Static task
static1
Behavioral task
behavioral1
Sample
454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe
-
Size
277KB
-
MD5
e8daf8e5cfcc28c69e31eb389c9ccc26
-
SHA1
57ecda50d08933d4a5e8ad4c41fcc4a4c7f27e54
-
SHA256
454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8
-
SHA512
0da1da0fd88c761339308b6737d67fbc48e283667333f6082ff9d223a01f82362749c8ce5de52e70456bb17d65ae1dc4ea4d3bb5392416ffe4957bab76ab9cc4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exexinputduplex.exexinputduplex.exepid process 2068 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe 2068 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe 2500 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe 2500 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe 4552 xinputduplex.exe 4552 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe 844 xinputduplex.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exepid process 2500 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exexinputduplex.exedescription pid process target process PID 2068 wrote to memory of 2500 2068 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe PID 2068 wrote to memory of 2500 2068 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe PID 2068 wrote to memory of 2500 2068 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe 454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe PID 4552 wrote to memory of 844 4552 xinputduplex.exe xinputduplex.exe PID 4552 wrote to memory of 844 4552 xinputduplex.exe xinputduplex.exe PID 4552 wrote to memory of 844 4552 xinputduplex.exe xinputduplex.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe"C:\Users\Admin\AppData\Local\Temp\454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe"C:\Users\Admin\AppData\Local\Temp\454aa330584eb807419c9b81f9bf0093cf661f7ef717c26ca7f0302ab8e0e8c8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2500
-
C:\Windows\SysWOW64\xinputduplex.exe"C:\Windows\SysWOW64\xinputduplex.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\xinputduplex.exe"C:\Windows\SysWOW64\xinputduplex.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:844