Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 06:52
Static task
static1
Behavioral task
behavioral1
Sample
4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe
Resource
win10v2004-20220901-en
General
-
Target
4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe
-
Size
53KB
-
MD5
473e1afbab989864bb22e601a378c440
-
SHA1
3d5511fdd5d9a70c8292a2e9f299dc4682493676
-
SHA256
4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55
-
SHA512
115e0dbdeda777146d41615e4d432f18a96d7de9fb87d37e4f9455579e6e737403884f10ebc33ba3907b701b4a0b514ea6e09605301cff38ea08f810dd030b59
-
SSDEEP
768:qivXGW5wHzqEVR3BAornyV0pf1RiK/49OTr1mz5ONpjhkHIUJZLk9OG:fvX/KvVTnu0BxVAzUN1xg1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1744 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1612 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1612 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1732 4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1744 1732 4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe 28 PID 1732 wrote to memory of 1744 1732 4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe 28 PID 1732 wrote to memory of 1744 1732 4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe 28 PID 1732 wrote to memory of 1744 1732 4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe 28 PID 1744 wrote to memory of 1612 1744 cmd.exe 30 PID 1744 wrote to memory of 1612 1744 cmd.exe 30 PID 1744 wrote to memory of 1612 1744 cmd.exe 30 PID 1744 wrote to memory of 1612 1744 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe"C:\Users\Admin\AppData\Local\Temp\4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 4b50e28264b5b996f13d95b3e2f619022e5623d9cd291f1c93dab62754ad8f55.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-