Analysis
-
max time kernel
41s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe
Resource
win10v2004-20220901-en
General
-
Target
13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe
-
Size
1.1MB
-
MD5
fc21b4acce6e538ea2f4655120370954
-
SHA1
bf388bb3cf4dbc445409f2a80f30c3c2cd69c4de
-
SHA256
13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560
-
SHA512
59c21c325c11f3e6ab8a56fc97846e2059d388b4d41694bf05445893ccea259585454002c3832bd0dbe9b87b8c6f3b0a5d57e2cb2077e0d534678f790b56ce02
-
SSDEEP
12288:bpScixoSkJS89D6KEb/kKOoCh2GoOGykcYWIvj4m7xXtYCk6PoKHpYJpMbklK0SF:bpbSkJS89hEwK6hqOk+6j4GRTOK08hxl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1492 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1492 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1492 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1492 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe 1492 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1492 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe 1492 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 832 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe 1492 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 1492 832 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe 27 PID 832 wrote to memory of 1492 832 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe 27 PID 832 wrote to memory of 1492 832 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe 27 PID 832 wrote to memory of 1492 832 13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe"C:\Users\Admin\AppData\Local\Temp\13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe"C:\Users\Admin\AppData\Local\Temp\13b3287f0c9f57a7cc8897ee88a2f3c4bba8e301e843c736af4faa27d5864560.exe" - 789CE3E6C60EBEB3C5FFA87BF2D40187343700C52A06EC2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1492
-