Analysis
-
max time kernel
45s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe
Resource
win10v2004-20220812-en
General
-
Target
02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe
-
Size
64KB
-
MD5
a420f9ca044c493919b4054c6ffdc870
-
SHA1
ed39b918f4f349ec5c65d9ab8c42261fff8627e6
-
SHA256
02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe
-
SHA512
a32818f4d7dedbfb2c68e4560e77f096ccc9fd8b4bc4e6d4151f41c770110d3095ffb5cfff3181410f7a5d01baf931e0bddfde00a4a98dbcc1f1bb5b4333d9f3
-
SSDEEP
1536:xET64WKch3dQzOwtwSI3yHBUJu5OXIvzpjIp/L:xq64Wx3dmqSSyHBknGzpjA/L
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1192 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1192 2020 02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe 28 PID 2020 wrote to memory of 1192 2020 02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe 28 PID 2020 wrote to memory of 1192 2020 02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe 28 PID 2020 wrote to memory of 1192 2020 02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe"C:\Users\Admin\AppData\Local\Temp\02ef4243c21ba64d3622b0cdba21a598ca12da3b5fe5d5ba0e3871471e1cdcfe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Bvz..bat" > nul 2> nul2⤵
- Deletes itself
PID:1192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD513b151243eedd16a881a83a56552b15d
SHA1447e9251f9ccf463b78bb928836591c1c9413675
SHA2569198eb5528920e83769dda2b502cbebcadb7d3aa3757f757571d7a13d1951aac
SHA5127ca0afca46548bbc78159d023fdd4c6d2166e9f819c6b745e3a400d9126abef3ef867d306fdc3649e28ea626895cc9ccac0d914ecd115c04ece1d40aa2ff8c41