Analysis
-
max time kernel
30s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe
Resource
win10v2004-20220812-en
General
-
Target
6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe
-
Size
22KB
-
MD5
4b0db1800201e83f7c495d417dfa9870
-
SHA1
89c092e51db10b28fd245446c467080e2c4a9a07
-
SHA256
6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f
-
SHA512
167c5dbb5e0a1ef64fc7dc493dd9f7732277cd24f92a876b0470ba515508ec43163f298f5028df5e038591996479d5171441529f67306c4f01c6f4665925c494
-
SSDEEP
384:ymi713pTn4xH9p/mkT8rrqlqZUYvO+1UdPwPXGHuxctpd1:ymi7dm9ef8kzvJPXGHumfL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1112 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 588 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 588 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1112 1964 6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe 29 PID 1964 wrote to memory of 1112 1964 6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe 29 PID 1964 wrote to memory of 1112 1964 6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe 29 PID 1964 wrote to memory of 1112 1964 6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe 29 PID 1112 wrote to memory of 588 1112 cmd.exe 31 PID 1112 wrote to memory of 588 1112 cmd.exe 31 PID 1112 wrote to memory of 588 1112 cmd.exe 31 PID 1112 wrote to memory of 588 1112 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe"C:\Users\Admin\AppData\Local\Temp\6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 6f4a81ae50bb94340f65b12c384d08075e5c1a340e11a665878ae003bb10c33f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-