Analysis
-
max time kernel
184s -
max time network
234s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 18:26
Static task
static1
Behavioral task
behavioral1
Sample
54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe
Resource
win7-20220715-en
windows7-x64
7 signatures
150 seconds
General
-
Target
54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe
-
Size
136KB
-
MD5
7ebfdaade79a9176976fa08d700204ac
-
SHA1
58cb57bd8b5dbd1d85ba931f20522e93666141e6
-
SHA256
54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232
-
SHA512
ecc1501a1e547d853d8e14a284b68235c2c26871a4aa5e46bb3bfe78278ca64ee99f07d0a828ee795312348796be3f4aaf0c331d70417f98dbe558c151bc33b9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1476 54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe 1476 54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe 3340 54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe 3340 54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe 3972 tmpliprop.exe 3972 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe 1196 tmpliprop.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3340 54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1476 wrote to memory of 3340 1476 54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe 81 PID 1476 wrote to memory of 3340 1476 54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe 81 PID 1476 wrote to memory of 3340 1476 54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe 81 PID 3972 wrote to memory of 1196 3972 tmpliprop.exe 84 PID 3972 wrote to memory of 1196 3972 tmpliprop.exe 84 PID 3972 wrote to memory of 1196 3972 tmpliprop.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe"C:\Users\Admin\AppData\Local\Temp\54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe"C:\Users\Admin\AppData\Local\Temp\54bc56e089ad144f902f0a478365628e3c7b0a1739abb56200c3e1a724fd5232.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3340
-
-
C:\Windows\SysWOW64\tmpliprop.exe"C:\Windows\SysWOW64\tmpliprop.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\tmpliprop.exe"C:\Windows\SysWOW64\tmpliprop.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-