Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 02:44
Static task
static1
Behavioral task
behavioral1
Sample
a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe
Resource
win10v2004-20220812-en
General
-
Target
a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe
-
Size
77KB
-
MD5
6709c6cb0430191a25904d5a9ecd0700
-
SHA1
f469a487d374e9cdbb4ed1d09bf0408e51b7950c
-
SHA256
a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e
-
SHA512
b724cfe862890b58e28ef1f1888ad7c0265d91b05288ea11e5b8f04fc174f8f427a91fada38fb99ad91a1aa1f784322d35892cb486903dc91518353a97e8266e
-
SSDEEP
1536:GmAIW39QfiyfOAAlzzZ717afH9DgwPQP:GRz39aoxRe1DPQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 524 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1924 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1924 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1492 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1492 wrote to memory of 524 1492 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe 28 PID 1492 wrote to memory of 524 1492 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe 28 PID 1492 wrote to memory of 524 1492 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe 28 PID 1492 wrote to memory of 524 1492 a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe 28 PID 524 wrote to memory of 1924 524 cmd.exe 30 PID 524 wrote to memory of 1924 524 cmd.exe 30 PID 524 wrote to memory of 1924 524 cmd.exe 30 PID 524 wrote to memory of 1924 524 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe"C:\Users\Admin\AppData\Local\Temp\a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del a7c5d4dab8882f979c652621f15c6d6c89aefca9ad64a073a36783d85f4c874e.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-