Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
87KB
-
MD5
912d1b3c8ce0299747597476431b71b8
-
SHA1
47df991891a5c7a31adfe531733f0b9d2ab77d05
-
SHA256
7cf80e503de7359981b5021d79b99d8a086287cd229946181e7664cc00805027
-
SHA512
c0480cf49d2e4dd14ce0be58f6a50dbcceddfd52706cbd66e962152d9e7599121ac821eb30a554ce6343e628c3fc3d5886c4835d5e39d14996592fb7218164bb
-
SSDEEP
1536:77fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfmxH9Ok:Xq6+ouCpk2mpcWJ0r+QNTBfmz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
pid Process 1252 timeout.exe 968 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1104 powershell.exe 1664 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1104 powershell.exe Token: SeDebugPrivilege 1664 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1340 1424 tmp.exe 26 PID 1424 wrote to memory of 1340 1424 tmp.exe 26 PID 1424 wrote to memory of 1340 1424 tmp.exe 26 PID 1424 wrote to memory of 1340 1424 tmp.exe 26 PID 1340 wrote to memory of 1252 1340 cmd.exe 28 PID 1340 wrote to memory of 1252 1340 cmd.exe 28 PID 1340 wrote to memory of 1252 1340 cmd.exe 28 PID 1340 wrote to memory of 892 1340 cmd.exe 29 PID 1340 wrote to memory of 892 1340 cmd.exe 29 PID 1340 wrote to memory of 892 1340 cmd.exe 29 PID 892 wrote to memory of 944 892 net.exe 30 PID 892 wrote to memory of 944 892 net.exe 30 PID 892 wrote to memory of 944 892 net.exe 30 PID 1340 wrote to memory of 1104 1340 cmd.exe 31 PID 1340 wrote to memory of 1104 1340 cmd.exe 31 PID 1340 wrote to memory of 1104 1340 cmd.exe 31 PID 1340 wrote to memory of 968 1340 cmd.exe 32 PID 1340 wrote to memory of 968 1340 cmd.exe 32 PID 1340 wrote to memory of 968 1340 cmd.exe 32 PID 1340 wrote to memory of 1664 1340 cmd.exe 33 PID 1340 wrote to memory of 1664 1340 cmd.exe 33 PID 1340 wrote to memory of 1664 1340 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4B92.tmp\4B93.tmp\4B94.bat C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\system32\timeout.exeTimeout /NOBREAK /T 53⤵
- Delays execution with timeout.exe
PID:1252
-
-
C:\Windows\system32\net.exeNET FILE3⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 FILE4⤵PID:944
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' -Force"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
C:\Windows\system32\timeout.exeTimeout /NOBREAK /T 53⤵
- Delays execution with timeout.exe
PID:968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' -Force"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
781B
MD5630372e70ebc473f27a93c2aea52a96c
SHA18507591d8416130fed7181343d0e566df5475c4e
SHA256e8eda5bf6f2b74e8a9c1c8bb030eaa650c3660fd650edbadcd650d818de7893e
SHA51253a644f0d0dadf54e074567ee8fc0f53b2ff8a3f359c7bd19e429743b1ec3edaa8a2d5c7058ca194ccf1e2adbbe086369d604891b022e6724cd0876f658db892
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59f4aa32341e2c3ad13f523ca22c35848
SHA1589f1e256ddb8548a39b5fac43e538a2070103d5
SHA25606a4d399c958eb9e230e3f88056a7e24b18dad93869c062b61f43f1473bba7b6
SHA512de85c9cebc51b06038597e232631b69799172843d6f3517d1ff1986732cfe0d3ae2fef6eb0ffa5b91051875bc6efb5291500c82dc12081a621dc8cb945e7462f