Analysis
-
max time kernel
23s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe
Resource
win10v2004-20220901-en
Errors
General
-
Target
8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe
-
Size
53KB
-
MD5
64f80e283bcec3635b986d2ca1545845
-
SHA1
3c4eb8d4ddc1eb2232c9b5557806aaf8f2580e10
-
SHA256
8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d
-
SHA512
074ae6ff6b0a748ea41de8070c03b088ad8b874be56eb7a03568f595e3d65c3aa6b8702a7479f415910569cedd59ec0259a8b8eda6da7f4456c803dbe6414943
-
SSDEEP
768:G8kBWVSi24ndLnlMRexhli2O0sprqSw/ZHOBFoSEWbDI41M8uF+Aqkcr:YWpBlMqi50YWSw/ZHOBFCoDIkLp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2008 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\5586567 = "C:\\Users\\Admin\\5586567.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe Token: SeShutdownPrivilege 616 shutdown.exe Token: SeRemoteShutdownPrivilege 616 shutdown.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1880 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 26 PID 1928 wrote to memory of 1880 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 26 PID 1928 wrote to memory of 1880 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 26 PID 1928 wrote to memory of 1880 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 26 PID 1880 wrote to memory of 1144 1880 cMd.exE 28 PID 1880 wrote to memory of 1144 1880 cMd.exE 28 PID 1880 wrote to memory of 1144 1880 cMd.exE 28 PID 1880 wrote to memory of 1144 1880 cMd.exE 28 PID 1928 wrote to memory of 616 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 29 PID 1928 wrote to memory of 616 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 29 PID 1928 wrote to memory of 616 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 29 PID 1928 wrote to memory of 616 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 29 PID 1928 wrote to memory of 2008 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 31 PID 1928 wrote to memory of 2008 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 31 PID 1928 wrote to memory of 2008 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 31 PID 1928 wrote to memory of 2008 1928 8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe"C:\Users\Admin\AppData\Local\Temp\8ea890bbb0c00ea7f490c92c5db60648ce32734f80d34ab1543aa207dc326c9d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cMd.exEcMd.exE /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 5586567 /t REG_SZ /d "%userprofile%\5586567.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 5586567 /t REG_SZ /d "C:\Users\Admin\5586567.exe" /f3⤵
- Adds Run key to start application
PID:1144
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\8EA890~1.EXE > nul2⤵
- Deletes itself
PID:2008
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1368
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1216