Analysis
-
max time kernel
45s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe
Resource
win10v2004-20220812-en
General
-
Target
fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe
-
Size
88KB
-
MD5
3bef287a53a23e2052219b7d73f4ef40
-
SHA1
48b62fec80a5301f091b8cc87a843d5f5443e39a
-
SHA256
fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d
-
SHA512
8f6e857240ede5f43ef0fa5b0e18e4534b1bc4e0663c5e0b48a5ae31f61b7824ca1f92fe622f701c6404d8abf0402382f1a85385fb4a17a8f6d325d581b9e79b
-
SSDEEP
1536:xpFrupx9oS7mOTEffZxid/sSTUr0cLSyEmiXeaxWw:xjupxT7rdJTUr0cLSyEJXdWw
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1868 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1868 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1500 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1500 wrote to memory of 560 1500 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe 29 PID 1500 wrote to memory of 560 1500 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe 29 PID 1500 wrote to memory of 560 1500 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe 29 PID 1500 wrote to memory of 560 1500 fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe 29 PID 560 wrote to memory of 1868 560 cmd.exe 31 PID 560 wrote to memory of 1868 560 cmd.exe 31 PID 560 wrote to memory of 1868 560 cmd.exe 31 PID 560 wrote to memory of 1868 560 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe"C:\Users\Admin\AppData\Local\Temp\fa9054c2360af18e29931f7b262dec864c0685ab048e8e98e4d63387f58aa19d.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del fa9054c2360af18e29931f7b262dec864c2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-