Analysis
-
max time kernel
72s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
26/09/2022, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe
Resource
win10-20220901-en
General
-
Target
b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe
-
Size
1.1MB
-
MD5
5c4cfe3db6f7175bd2719485ac23974b
-
SHA1
c7618cacf8e78e5c8dac38b7d0dc135229446e3a
-
SHA256
b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0
-
SHA512
42be53117604224b8c11b3b807c1c0f5c9a26aa7ecf1c5fc14fff3a0b946f05664faf3af551d11e984fc9562b3cacbfd1cf0fe092fed74d28d336145d0643cd0
-
SSDEEP
24576:6b+k+esLztiFAzFiyq/30MmmI54XoLCj1Q92JjnTgCWThOwROpziKZ/vMhT/L0A:6bwLoe0yq/kjmQ83s4TghjO5iKZ/q
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\Agtysdai = "\"C:\\Users\\Admin\\AppData\\Roaming\\Fqkbhm\\Agtysdai.exe\"" b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3544 powershell.exe 3544 powershell.exe 3544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3544 powershell.exe Token: SeDebugPrivilege 4944 b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3544 4944 b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe 66 PID 4944 wrote to memory of 3544 4944 b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe 66 PID 4944 wrote to memory of 3544 4944 b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe"C:\Users\Admin\AppData\Local\Temp\b0aa06883333fa58b6eaad6fb9cf25de42ebd9578b26dc9dd15441c3f98143e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAzAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-