Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe
Resource
win10v2004-20220901-en
General
-
Target
969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe
-
Size
668KB
-
MD5
41ff05186e7ee252dfade7dfff0f4cb0
-
SHA1
cc4aea54ac73df9261a5f2600f5b8ef8565bf3e1
-
SHA256
969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f
-
SHA512
957fa80102dc28275a4d6378b244a3343f96816ccca09733d6f9d094d2e0e4152900a4afe475eb9456cb765750264ce26c5724dd9deed9c0e57671ed20668fc3
-
SSDEEP
12288:Wvpgha0fy5/ifxZKwmtUu/ZewTKrp6I+wp15jEII8avI+tUAuQ6h6G+5Nl:Wvmhat50R5uRRKrr+wlj/IzJtN6M/r
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1760-55-0x0000000001C00000-0x0000000001D4B000-memory.dmp upx behavioral1/memory/1760-59-0x0000000001C00000-0x0000000001D4B000-memory.dmp upx behavioral1/memory/1760-58-0x0000000001C00000-0x0000000001D4B000-memory.dmp upx behavioral1/memory/1760-62-0x0000000001C00000-0x0000000001D4B000-memory.dmp upx behavioral1/memory/1760-63-0x0000000001C00000-0x0000000001D4B000-memory.dmp upx behavioral1/memory/1148-66-0x0000000001D80000-0x0000000001ECB000-memory.dmp upx behavioral1/memory/1148-69-0x0000000001D80000-0x0000000001ECB000-memory.dmp upx behavioral1/memory/1148-70-0x0000000001D80000-0x0000000001ECB000-memory.dmp upx behavioral1/memory/1148-71-0x0000000001D80000-0x0000000001ECB000-memory.dmp upx behavioral1/memory/1760-74-0x0000000001C00000-0x0000000001D4B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1148 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe 27 PID 1760 wrote to memory of 1148 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe 27 PID 1760 wrote to memory of 1148 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe 27 PID 1760 wrote to memory of 1148 1760 969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe"C:\Users\Admin\AppData\Local\Temp\969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe"C:\Users\Admin\AppData\Local\Temp\969ba838cab7b2c3e5f6d45a2410ceaabb545970c5996a60e16ab0dcdabbf11f.exe" /_ShowProgress2⤵PID:1148
-