Analysis
-
max time kernel
38s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe
Resource
win10v2004-20220812-en
General
-
Target
9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe
-
Size
42KB
-
MD5
630c2ec0417faf7e3b560c3c2c87aae0
-
SHA1
cd3c2852214f5ea048c738d7889cfe70b70d1585
-
SHA256
9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0
-
SHA512
0b920b2eb0fc69fd12d5741077314a5a217c61c76188dcd2a26f40528ad816b1f9c09001c78035f52012bcb7fe3c25b9fa3b23ed6c937a01f32b2778344a18ae
-
SSDEEP
384:P60NofshC35/u1aVtn5/ti6yGXHqaON7AagMdB9AY5beqsKzWxGnNmRchT:vk7J/uMVtm6yaH0N7JVDAc/sGnoo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1484 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 592 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 592 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1848 9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1484 1848 9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe 29 PID 1848 wrote to memory of 1484 1848 9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe 29 PID 1848 wrote to memory of 1484 1848 9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe 29 PID 1848 wrote to memory of 1484 1848 9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe 29 PID 1484 wrote to memory of 592 1484 cmd.exe 31 PID 1484 wrote to memory of 592 1484 cmd.exe 31 PID 1484 wrote to memory of 592 1484 cmd.exe 31 PID 1484 wrote to memory of 592 1484 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe"C:\Users\Admin\AppData\Local\Temp\9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 9a8c0761dbd3a105fcbf078fc9f9650fd8ec005194ae452cb9a3792da9c3cfa0.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-