Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11-09-2022 07:47
Static task
static1
Behavioral task
behavioral1
Sample
34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe
Resource
win10-20220812-en
windows10-1703-x64
5 signatures
150 seconds
General
-
Target
34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe
-
Size
31.0MB
-
MD5
52bfa39dc9d72b0dac76ae9814af27ad
-
SHA1
74a7effc3cde14000209722299df15ca56c99946
-
SHA256
34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a
-
SHA512
bf48fd8e1edc3dc20d1545dd98826357f2472c6643258d5610921a002e73e71cb46edeb6a877f9560d943a5f05c1e58200278b430a8780282a7c7b1a6948befd
-
SSDEEP
786432:vR39Z2nrKhSUfx1ibQH9XmYbdwlzBI9WTL+s3YyKLhS:vR3XArkXqQHgYbdOza90Lj3e1
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4328 set thread context of 3600 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 68 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2132 powershell.exe 2132 powershell.exe 2132 powershell.exe 3600 MSBuild.exe 3600 MSBuild.exe 3600 MSBuild.exe 3600 MSBuild.exe 3600 MSBuild.exe 3600 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 3600 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4328 wrote to memory of 2132 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 66 PID 4328 wrote to memory of 2132 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 66 PID 4328 wrote to memory of 3600 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 68 PID 4328 wrote to memory of 3600 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 68 PID 4328 wrote to memory of 3600 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 68 PID 4328 wrote to memory of 3600 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 68 PID 4328 wrote to memory of 3600 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 68 PID 4328 wrote to memory of 3600 4328 34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe"C:\Users\Admin\AppData\Local\Temp\34df9595fe07276e90d10a9b2c153002c54820f4ee4e0e9b522e4a5dceebdd5a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-