Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe
Resource
win10v2004-20220812-en
General
-
Target
0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe
-
Size
96KB
-
MD5
370f1bdb84b9d85eb17114ba85e47c4a
-
SHA1
e80d73495998ea989af29680d9e3eff4d505cc0f
-
SHA256
0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39
-
SHA512
6d5736f574cb79baed09bdb00db35eb15812a073daa7468424e4a3d7eebfe4f1d8394d8345503ea67f19b64c8474a8beb77f6706a4e49c02a5e5fc4b192c5c5c
-
SSDEEP
1536:kidlOpAxg+NqQgrDF0zmHIQco3KazKoTpVNaGwCeNOm:Tdgucht64co3KaGa7UCK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 748 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 864 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 864 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1672 0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1672 wrote to memory of 748 1672 0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe 28 PID 1672 wrote to memory of 748 1672 0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe 28 PID 1672 wrote to memory of 748 1672 0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe 28 PID 1672 wrote to memory of 748 1672 0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe 28 PID 748 wrote to memory of 864 748 cmd.exe 30 PID 748 wrote to memory of 864 748 cmd.exe 30 PID 748 wrote to memory of 864 748 cmd.exe 30 PID 748 wrote to memory of 864 748 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe"C:\Users\Admin\AppData\Local\Temp\0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 0389123dc756c07110be70dced08f58826bcb75eb3039135d5c623f1faa6bb39.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-