Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2022, 08:34
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Bulz.342535.30390.exe
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Bulz.342535.30390.exe
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Variant.Bulz.342535.30390.exe
-
Size
4.3MB
-
MD5
523dd7b1a4a74fcab6f9649eb99a005d
-
SHA1
f634d2ab3432bf15aeb9f738547ab0302f3d5ff3
-
SHA256
1d4051c817f8893c717d1f55c6bd92d0359c86b6db79d7d453aae7f7db61249c
-
SHA512
a9c3c15bf83290bfd1a5778fa65dba4d2f0e046f6130f99661a2aef768e6694c7d56eda0747cbed47cc7f0422796440c5ef4f6b785f669b62472f1a07fa66dce
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4444 SecuriteInfo.com.Variant.Bulz.342535.30390.exe 4444 SecuriteInfo.com.Variant.Bulz.342535.30390.exe 4444 SecuriteInfo.com.Variant.Bulz.342535.30390.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4444 wrote to memory of 448 4444 SecuriteInfo.com.Variant.Bulz.342535.30390.exe 81 PID 4444 wrote to memory of 448 4444 SecuriteInfo.com.Variant.Bulz.342535.30390.exe 81 PID 4444 wrote to memory of 448 4444 SecuriteInfo.com.Variant.Bulz.342535.30390.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Bulz.342535.30390.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Bulz.342535.30390.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:448
-