Analysis
-
max time kernel
204s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 11:01
Static task
static1
Behavioral task
behavioral1
Sample
5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
150 seconds
General
-
Target
5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe
-
Size
160KB
-
MD5
a4a862ae8115eedc3ca313c5e68ed85c
-
SHA1
1aabc75c61d760b6185f800bd7654b0083f88d03
-
SHA256
5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e
-
SHA512
6e4b57d87b0eb2c3fa3c6c2af5e79d40344730390ea0fbde1ec077cd310e68983fe9b132bf0c64c43d7659f9675da45646b9015df14c637d902ce1376a2144d1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4856 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 4856 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 3800 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 3800 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 2264 muteroyale.exe 2264 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe 2308 muteroyale.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3800 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4856 wrote to memory of 3800 4856 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 82 PID 4856 wrote to memory of 3800 4856 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 82 PID 4856 wrote to memory of 3800 4856 5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe 82 PID 2264 wrote to memory of 2308 2264 muteroyale.exe 84 PID 2264 wrote to memory of 2308 2264 muteroyale.exe 84 PID 2264 wrote to memory of 2308 2264 muteroyale.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe"C:\Users\Admin\AppData\Local\Temp\5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe"C:\Users\Admin\AppData\Local\Temp\5f90ec8324a3be0c7da857e54a613161296b3c083e8a668a44c3fd352571439e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:3800
-
-
C:\Windows\SysWOW64\muteroyale.exe"C:\Windows\SysWOW64\muteroyale.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\muteroyale.exe"C:\Windows\SysWOW64\muteroyale.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-