Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 11:42
Behavioral task
behavioral1
Sample
4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe
-
Size
658KB
-
MD5
6e15b1592b29d8d4436d987f34b463ef
-
SHA1
d94df874ae7b1e0ccc2c709a846ece3ce3bee907
-
SHA256
4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5
-
SHA512
c306ac02d1432063bace82bdb37a24b6859219608f7098857880b48209a4eee0c520417b5dfb71a31560ad735beddd69b253646c1e6443c9b1f9b27dd507597c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exedescription pid process Token: SeIncreaseQuotaPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeSecurityPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeTakeOwnershipPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeLoadDriverPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeSystemProfilePrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeSystemtimePrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeProfSingleProcessPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeIncBasePriorityPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeCreatePagefilePrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeBackupPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeRestorePrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeShutdownPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeDebugPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeSystemEnvironmentPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeChangeNotifyPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeRemoteShutdownPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeUndockPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeManageVolumePrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeImpersonatePrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: SeCreateGlobalPrivilege 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: 33 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: 34 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe Token: 35 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exepid process 1156 4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe"C:\Users\Admin\AppData\Local\Temp\4c57ed2ad4e4465a12d803faecf2cebd597c55d77c94f78259e20b7a29f989e5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1156-54-0x00000000754F1000-0x00000000754F3000-memory.dmpFilesize
8KB