Analysis
-
max time kernel
82s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-09-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
5654babea8cf2c856f3a9d80df0d870f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5654babea8cf2c856f3a9d80df0d870f.exe
Resource
win10v2004-20220812-en
General
-
Target
5654babea8cf2c856f3a9d80df0d870f.exe
-
Size
7KB
-
MD5
5654babea8cf2c856f3a9d80df0d870f
-
SHA1
d1616e178c28047cda740ed548fef1ea32b706ca
-
SHA256
ae97f685de90bcfe19c397b32d12d1bca259d7465f3870083a914474efb58e34
-
SHA512
03377da27ebad86d77b546af9775bba51d170b7f0b9533b54ecac68c053e6790f15e276a15c4491fc8f162ac2275e633bf8f471244226e40a5dd523304cab863
-
SSDEEP
96:J6Zf7h++B3Evve6LYX48IhlPVsfVRu+JqojYVhqTzNt:esG6LYX45hMf6+U5Vo1
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5654babea8cf2c856f3a9d80df0d870f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Jgwwt = "\"C:\\Users\\Admin\\AppData\\Roaming\\Matsaiv\\Jgwwt.exe\"" 5654babea8cf2c856f3a9d80df0d870f.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5654babea8cf2c856f3a9d80df0d870f.exedescription pid process target process PID 1980 set thread context of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 1364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
5654babea8cf2c856f3a9d80df0d870f.exepowershell.exe5654babea8cf2c856f3a9d80df0d870f.exedescription pid process Token: SeDebugPrivilege 1980 5654babea8cf2c856f3a9d80df0d870f.exe Token: SeDebugPrivilege 1364 powershell.exe Token: SeDebugPrivilege 284 5654babea8cf2c856f3a9d80df0d870f.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
5654babea8cf2c856f3a9d80df0d870f.exedescription pid process target process PID 1980 wrote to memory of 1364 1980 5654babea8cf2c856f3a9d80df0d870f.exe powershell.exe PID 1980 wrote to memory of 1364 1980 5654babea8cf2c856f3a9d80df0d870f.exe powershell.exe PID 1980 wrote to memory of 1364 1980 5654babea8cf2c856f3a9d80df0d870f.exe powershell.exe PID 1980 wrote to memory of 1364 1980 5654babea8cf2c856f3a9d80df0d870f.exe powershell.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe PID 1980 wrote to memory of 284 1980 5654babea8cf2c856f3a9d80df0d870f.exe 5654babea8cf2c856f3a9d80df0d870f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exe"C:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANQAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exeC:\Users\Admin\AppData\Local\Temp\5654babea8cf2c856f3a9d80df0d870f.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:284