Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
7f741dca47012c410a9b6c567602a71956738ac386826e457fb10dd43d326d16.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f741dca47012c410a9b6c567602a71956738ac386826e457fb10dd43d326d16.lnk
Resource
win10v2004-20220812-en
General
-
Target
7f741dca47012c410a9b6c567602a71956738ac386826e457fb10dd43d326d16.lnk
-
Size
800B
-
MD5
7be924fb228adb630c6ff08b63e2e860
-
SHA1
8a9d50823eac899bd6a2a5fb11f77f1448ffc725
-
SHA256
7f741dca47012c410a9b6c567602a71956738ac386826e457fb10dd43d326d16
-
SHA512
fc4d79e7d0ab6e1be7099e4bc8eee08f64ff6acf7a9595df98aaabd640bb3382bd0eeb32165751a7ed2ada1cace1a688b9c2f9cb58763ade59ea04abf47c5f9b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1788 wrote to memory of 908 1788 cmd.exe 29 PID 1788 wrote to memory of 908 1788 cmd.exe 29 PID 1788 wrote to memory of 908 1788 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7f741dca47012c410a9b6c567602a71956738ac386826e457fb10dd43d326d16.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" \n1db.lyiv.8s63.6i3gsdb.yiv8s63.sdq31.v8s6i3g.sdq3n16,ybn8lyiv8s6i3gs32⤵PID:908
-