Analysis
-
max time kernel
149s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-07-2022 07:18
Static task
static1
Behavioral task
behavioral1
Sample
4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe
-
Size
413KB
-
MD5
f9178e2a50b57e49bc18bef516931380
-
SHA1
58dab44d83c6f1ad4407d77b88874e126b732688
-
SHA256
4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3
-
SHA512
ac34c8342f06ca981ed5c549c32d9fae8996bd06d14b35d361072431b9480218e2f80aa7e997d659ed4e5d904f84432802f385c25e87c0159ee11781bd6aa7e5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exeiconsvoice.exeiconsvoice.exepid process 4952 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe 4952 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe 864 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe 864 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe 384 iconsvoice.exe 384 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe 2292 iconsvoice.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exepid process 864 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exeiconsvoice.exedescription pid process target process PID 4952 wrote to memory of 864 4952 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe PID 4952 wrote to memory of 864 4952 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe PID 4952 wrote to memory of 864 4952 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe 4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe PID 384 wrote to memory of 2292 384 iconsvoice.exe iconsvoice.exe PID 384 wrote to memory of 2292 384 iconsvoice.exe iconsvoice.exe PID 384 wrote to memory of 2292 384 iconsvoice.exe iconsvoice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe"C:\Users\Admin\AppData\Local\Temp\4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe"C:\Users\Admin\AppData\Local\Temp\4c3c7c77dacd9a2233279a2091cb4165d845678e00be085b1c3aba22fafecfb3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:864
-
-
C:\Windows\SysWOW64\iconsvoice.exe"C:\Windows\SysWOW64\iconsvoice.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\iconsvoice.exe"C:\Windows\SysWOW64\iconsvoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-