Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 18:15
Static task
static1
Behavioral task
behavioral1
Sample
1aee5b97c777fd7c7db6ba98974ddc49.exe
Resource
win7-20220812-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1aee5b97c777fd7c7db6ba98974ddc49.exe
-
Size
340KB
-
MD5
1aee5b97c777fd7c7db6ba98974ddc49
-
SHA1
b6e8bb3152c5e541afd1725da98377ae2def1b9b
-
SHA256
385c9c32cf0f1661f1831b5fabe93f41ac609b31eaea300c327a71de0bfdcbcc
-
SHA512
87547ecbe9587a10a6a759548ae76913c6756c9f88a34f62487a9584410a29a25e527a184f5fd6d68ec6cc56d22bda621262f820800d45ecf91eec658dd22655
-
SSDEEP
6144:k/TL+BteH67joN07TEH3qx2xcT4Zx7u3OYm4k6c0t+niga:k76BtboOwH3qx2RCOjkt+i
Malware Config
Extracted
Family
nymaim
C2
208.67.104.97
85.31.46.167
Signatures
-
Deletes itself 1 IoCs
pid Process 1924 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1004 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1004 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 752 wrote to memory of 1924 752 1aee5b97c777fd7c7db6ba98974ddc49.exe 30 PID 752 wrote to memory of 1924 752 1aee5b97c777fd7c7db6ba98974ddc49.exe 30 PID 752 wrote to memory of 1924 752 1aee5b97c777fd7c7db6ba98974ddc49.exe 30 PID 752 wrote to memory of 1924 752 1aee5b97c777fd7c7db6ba98974ddc49.exe 30 PID 1924 wrote to memory of 1004 1924 cmd.exe 32 PID 1924 wrote to memory of 1004 1924 cmd.exe 32 PID 1924 wrote to memory of 1004 1924 cmd.exe 32 PID 1924 wrote to memory of 1004 1924 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aee5b97c777fd7c7db6ba98974ddc49.exe"C:\Users\Admin\AppData\Local\Temp\1aee5b97c777fd7c7db6ba98974ddc49.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1aee5b97c777fd7c7db6ba98974ddc49.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1aee5b97c777fd7c7db6ba98974ddc49.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1aee5b97c777fd7c7db6ba98974ddc49.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-