Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 07:14
Static task
static1
Behavioral task
behavioral1
Sample
46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe
Resource
win10v2004-20220901-en
General
-
Target
46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe
-
Size
121KB
-
MD5
4ce2f493f2f0176be43b4fcba8e4ea80
-
SHA1
e2e7c3e4011b0434a6e7c8b15b8ddb13928da9d8
-
SHA256
46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1
-
SHA512
41a4b5af8c57205faf3d9a4429636d2cb8b4b1f4d0039ca54e985d30e01c45c86b324be741beec4354bc1d5057f7e1daa15caa87f23c76c1f1cf5239aac82400
-
SSDEEP
1536:WYFQkDV1Qwt/HFqmE5O20UB1pOvyVlO2ekpwhAq8ApFmqVIvZ+h:hvZtPFqJO20qpOAl1LwhADYWv4h
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1464 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 336 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 336 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1464 1488 46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe 27 PID 1488 wrote to memory of 1464 1488 46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe 27 PID 1488 wrote to memory of 1464 1488 46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe 27 PID 1488 wrote to memory of 1464 1488 46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe 27 PID 1464 wrote to memory of 336 1464 cmd.exe 29 PID 1464 wrote to memory of 336 1464 cmd.exe 29 PID 1464 wrote to memory of 336 1464 cmd.exe 29 PID 1464 wrote to memory of 336 1464 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe"C:\Users\Admin\AppData\Local\Temp\46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 46e72438d4cfb54406dbf5cf875789e4b2eb9e093ae6214eef39daa248ee68f1.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-