Analysis
-
max time kernel
33s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe
Resource
win10v2004-20220812-en
General
-
Target
800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe
-
Size
91KB
-
MD5
64e94ad967249c61bf27a31bed8eff31
-
SHA1
ae6f9edc48403cc645d1d57ba7c8c7c70f70f5be
-
SHA256
800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77
-
SHA512
49ac582c10ab1f52530b1a6778366a164479d634e903aad34fd549fe9d1dcf40976b3f395ce75809cce203f6bd5b41a4b742e05742f875996a9e7ed220b597d8
-
SSDEEP
1536:LlqmbxDIFoprhcZdmF8JC3IDS2E3YHfDqqr/XaNNSykFI+L:Llt9DL9MdmYQIeIHOqr/nykFIq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1748 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1748 1668 800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe 28 PID 1668 wrote to memory of 1748 1668 800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe 28 PID 1668 wrote to memory of 1748 1668 800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe 28 PID 1668 wrote to memory of 1748 1668 800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe"C:\Users\Admin\AppData\Local\Temp\800b55df0d168a83817ea4d34604809189a651a08468cc19f7e131796c97fe77.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Orz..bat" > nul 2> nul2⤵
- Deletes itself
PID:1748
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD53fab7b08cb362725af37c2cfaf03aff6
SHA13154f4d4319a5e7e997876ff1bc76638900cb7ec
SHA256654d374b16209a8efae91a8179c1094f654fb6673ee4117a533229eee6393218
SHA5122b8e5a8f7d660c97c2f1d21774ce5f94fba3f609e1461568ed0252de71e03d0a368caa40c87d0fff7c4634e847b4fb906101daf630d2d66c812d44e179583ff5