Analysis
-
max time kernel
18s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe
-
Size
50KB
-
MD5
70db48381cc8985df92a529e684ec5c2
-
SHA1
6be0b9e369a65164e410ca4f9b27f430c16bba20
-
SHA256
fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12
-
SHA512
bb059cfa4f6eebcf85dfd757b6e3ca12f7437b87e96fc83d9c6dade3531c9de8ce1da0518781f0a13758425d7da938aafb5e1312a7adc92e5645b65bda8a63f9
-
SSDEEP
768:EdWm+d1z8BXAqxw+E9Sb+7RFpvLXuZr32BBaAriUFE0tFmvDR7CkC5HVYPCw:kjkEw+CvNFxLXKyBhXm0tFmvDCHyP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 952 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\666114352 = "C:\\Users\\Admin\\666114352.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe Token: SeShutdownPrivilege 1064 shutdown.exe Token: SeRemoteShutdownPrivilege 1064 shutdown.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1384 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 26 PID 1248 wrote to memory of 1384 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 26 PID 1248 wrote to memory of 1384 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 26 PID 1248 wrote to memory of 1384 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 26 PID 1384 wrote to memory of 1972 1384 cmd.exe 28 PID 1384 wrote to memory of 1972 1384 cmd.exe 28 PID 1384 wrote to memory of 1972 1384 cmd.exe 28 PID 1384 wrote to memory of 1972 1384 cmd.exe 28 PID 1248 wrote to memory of 1064 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 29 PID 1248 wrote to memory of 1064 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 29 PID 1248 wrote to memory of 1064 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 29 PID 1248 wrote to memory of 1064 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 29 PID 1248 wrote to memory of 952 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 31 PID 1248 wrote to memory of 952 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 31 PID 1248 wrote to memory of 952 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 31 PID 1248 wrote to memory of 952 1248 fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe"C:\Users\Admin\AppData\Local\Temp\fed0da48fd070e4b6308b82eb3a3d028452beedee5e39f0908598b4010a5cc12.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 666114352 /t REG_SZ /d "%userprofile%\666114352.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 666114352 /t REG_SZ /d "C:\Users\Admin\666114352.exe" /f3⤵
- Adds Run key to start application
PID:1972
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\FED0DA~1.EXE > nul2⤵
- Deletes itself
PID:952
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:452
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1012