Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/08/2022, 08:34
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Bulz.342535.32662.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Bulz.342535.32662.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Variant.Bulz.342535.32662.exe
-
Size
4.3MB
-
MD5
d81e2a99d627cd3111580cb9bc051e08
-
SHA1
6f620d09c49c0caeb74597a8f84a56d7614ce2e1
-
SHA256
412bc5d35a364efe1b6bf256937961482f6202dde2f1581563ce738537f990c4
-
SHA512
70e15b0b1c702fc2a4bf8526b80f1df4eb9c1e9285791bee2afad4801e0179e283d27d0327ee7ca66ccb71f8aaf7fc399b34d8328f651fbdf143113c208e3a14
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1672 SecuriteInfo.com.Variant.Bulz.342535.32662.exe 1672 SecuriteInfo.com.Variant.Bulz.342535.32662.exe 1672 SecuriteInfo.com.Variant.Bulz.342535.32662.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1568 1672 SecuriteInfo.com.Variant.Bulz.342535.32662.exe 28 PID 1672 wrote to memory of 1568 1672 SecuriteInfo.com.Variant.Bulz.342535.32662.exe 28 PID 1672 wrote to memory of 1568 1672 SecuriteInfo.com.Variant.Bulz.342535.32662.exe 28 PID 1672 wrote to memory of 1568 1672 SecuriteInfo.com.Variant.Bulz.342535.32662.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Bulz.342535.32662.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Bulz.342535.32662.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1568
-