Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 06:53
Static task
static1
Behavioral task
behavioral1
Sample
3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe
Resource
win10v2004-20220901-en
General
-
Target
3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe
-
Size
92KB
-
MD5
698ed1228627b5ee1b6c663f2f11be90
-
SHA1
5552ed0d5f0fa5ff235889898b5e95e245a015d1
-
SHA256
3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad
-
SHA512
1bdfff3ac429339cfc5cc9a841a67a8ca44e108b491f676924248afaa828c78b85990d9fde8789d1636fb87401943536efe83496bc2549871103529eff184f6a
-
SSDEEP
1536:t6QE9k2lmZSQ/bYe0g/ICs+6kzYZVpekZKB0gOEzZGn:tX2lmZSQ/bYPg/ICs+FCVpekZKBMmYn
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 520 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 520 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1048 3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1048 wrote to memory of 892 1048 3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe 28 PID 1048 wrote to memory of 892 1048 3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe 28 PID 1048 wrote to memory of 892 1048 3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe 28 PID 1048 wrote to memory of 892 1048 3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe 28 PID 892 wrote to memory of 520 892 cmd.exe 30 PID 892 wrote to memory of 520 892 cmd.exe 30 PID 892 wrote to memory of 520 892 cmd.exe 30 PID 892 wrote to memory of 520 892 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe"C:\Users\Admin\AppData\Local\Temp\3b4e5651a3a4b96bf197f0a7b3cda3f90c0c829e4dd2557225c8ba6c4c9234ad.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 3b4e5651a3a4b96bf197f0a7b3cda3f90c2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-