Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2022 03:46
Static task
static1
Behavioral task
behavioral1
Sample
50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
150 seconds
General
-
Target
50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe
-
Size
912KB
-
MD5
c78e9c3e594be30a54f437e58cedfc59
-
SHA1
d16d18cdd974899c654fce95dd3427299e737735
-
SHA256
50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab
-
SHA512
d96cdfcffe84aaa9128225149ad5961477b2c10407ec885126dcb3ca340955b8b4dbd6a9e5c72f0453242bfcb504993fa013e90daca8233c8a0ac335e1f5fca3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1124 50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe 1124 50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe 2480 50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe 2480 50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe 4320 scnstring.exe 4320 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe 4196 scnstring.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2480 50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1124 wrote to memory of 2480 1124 50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe 77 PID 1124 wrote to memory of 2480 1124 50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe 77 PID 1124 wrote to memory of 2480 1124 50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe 77 PID 4320 wrote to memory of 4196 4320 scnstring.exe 79 PID 4320 wrote to memory of 4196 4320 scnstring.exe 79 PID 4320 wrote to memory of 4196 4320 scnstring.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe"C:\Users\Admin\AppData\Local\Temp\50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe"C:\Users\Admin\AppData\Local\Temp\50503f7e01611abca4ecbf80c098b35aeb038ace47be1605b0392910e71976ab.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2480
-
-
C:\Windows\SysWOW64\scnstring.exe"C:\Windows\SysWOW64\scnstring.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\scnstring.exe"C:\Windows\SysWOW64\scnstring.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-