Analysis
-
max time kernel
44s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe
Resource
win10v2004-20220812-en
General
-
Target
82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe
-
Size
68KB
-
MD5
6df1d8db64ee82de37c5d238d49f7f9f
-
SHA1
699e81eb5e490ede7f163bb1ecf1803acee2f438
-
SHA256
82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5
-
SHA512
2aa1e091b880f1b83a855d8ea19c76099e551eee72e84ae0f95875d1e56f893d47cf2dafaf888951e91baac8f82a306ae2c07ffd314caa96011994e06ce7bcf0
-
SSDEEP
1536:uG0nL0QxFuFDmLpnMT2CBrnTndnXnxC1XWXBXAXgi:8LXY9apMBBr
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1668 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeSecurityPrivilege 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe Token: SeDebugPrivilege 1668 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1748 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe 28 PID 1496 wrote to memory of 1748 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe 28 PID 1496 wrote to memory of 1748 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe 28 PID 1496 wrote to memory of 1748 1496 82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe 28 PID 1748 wrote to memory of 1668 1748 cmd.exe 30 PID 1748 wrote to memory of 1668 1748 cmd.exe 30 PID 1748 wrote to memory of 1668 1748 cmd.exe 30 PID 1748 wrote to memory of 1668 1748 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe"C:\Users\Admin\AppData\Local\Temp\82d560876cfa8800c9870d72ab935b173350d42c9c6716008de43fe18369edc5.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 82d560876cfa8800c9870d72ab935b17332⤵
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-