Analysis
-
max time kernel
120s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 01:34
Static task
static1
Behavioral task
behavioral1
Sample
a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe
Resource
win10v2004-20220812-en
General
-
Target
a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe
-
Size
637KB
-
MD5
67fd53e8953d5264d89f8eee5f9ddbe0
-
SHA1
62ff361cb76e08ddbaf035144cc049239e17e222
-
SHA256
a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527
-
SHA512
85a697bf454d69c5d997199a3ab11637a3da20ed20e62bddff5a692f9bc73feacce7a1c054815977f6c796f8a38d6010f9a983757677fce2401c2c82e3030d5f
-
SSDEEP
12288:fW4QErB/6dhOb+nnWT/uGbW85rrPuuUH5Y22LlQ5DXfsJP:+/ErB+NnWruGS8Vrmp5Y22E0J
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1216 a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1216 a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1216 wrote to memory of 4944 1216 a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe 85 PID 1216 wrote to memory of 4944 1216 a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe 85 PID 1216 wrote to memory of 4944 1216 a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe"C:\Users\Admin\AppData\Local\Temp\a676679900ff963e2ded9142c0f095842c2ec11b807cce2b595af1a797cdf527.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\temp\notepad.exeC:\Windows\temp\notepad.exe2⤵PID:4944
-