Analysis

  • max time kernel
    54s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-09-2022 18:36

General

  • Target

    Shipment Document BL,INV and packing list.jpg.exe

  • Size

    233KB

  • MD5

    53e4a3efc351af944cf2076a1dfcde1d

  • SHA1

    80c499867152c4baa991cad6127478affdce6548

  • SHA256

    054939c5e1c596a28eceffd6fc10e70b46f46a47e0fbc6cf341799368eb1c462

  • SHA512

    9eb3e33602905ae0a5f7ed385eebc7fa4b55e21f1e6d902c38fc5e5a222f3324916ae8e689013eb98dbc382ad094eeb01d7017a97f2c4a6f0e86d9aec4d3589e

  • SSDEEP

    3072:zQHNmk8c/c8LYxWk3T/PBfRBJjWs7AM1fldMW/3eVvIiWYV:VBrWkj/P1RBJjyF

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Shipment Document BL,INV and packing list.jpg.exe
    "C:\Users\Admin\AppData\Local\Temp\Shipment Document BL,INV and packing list.jpg.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    PID:1184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1184-54-0x00000000010A0000-0x00000000010E0000-memory.dmp

    Filesize

    256KB

  • memory/1184-55-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

    Filesize

    8KB