Analysis
-
max time kernel
36s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe
Resource
win10v2004-20220812-en
General
-
Target
7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe
-
Size
36KB
-
MD5
6d36812e11370dc80dd90ceb256c2f02
-
SHA1
3738e2b648e16a12f08f8c74c909cf10af65db43
-
SHA256
7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa
-
SHA512
4d4ae49650e4b33fc80b31a4ca542c85bb4e82dca721b89c4f6a16ed430afd9bc594c7e08ce3ef524cc12ca8ff7f81e61927c1c06713190e03261ac5bebd3a30
-
SSDEEP
768:k+RUFU8y6Hm/F3/De0/qKe09O8HL2TVlTgn6kd:kCUFU86zPe6HCTVJA6kd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1788 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1656 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1656 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1416 7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1788 1416 7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe 28 PID 1416 wrote to memory of 1788 1416 7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe 28 PID 1416 wrote to memory of 1788 1416 7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe 28 PID 1416 wrote to memory of 1788 1416 7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe 28 PID 1788 wrote to memory of 1656 1788 cmd.exe 30 PID 1788 wrote to memory of 1656 1788 cmd.exe 30 PID 1788 wrote to memory of 1656 1788 cmd.exe 30 PID 1788 wrote to memory of 1656 1788 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe"C:\Users\Admin\AppData\Local\Temp\7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 7cab4caf005ecd55b2359b65f1a52bf5bc6155e4ccc2e2de27fc6421431acbfa.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-