Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe
Resource
win10v2004-20220812-en
General
-
Target
9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe
-
Size
73KB
-
MD5
57d60fb31b5f77924d6159a30745c530
-
SHA1
8e766a31c03da2b06b8b75a7b0f5678139860052
-
SHA256
9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c
-
SHA512
e3906751ce8480c486dc8773e3b156de98e9d3cf27d30b6fafe813713017fb9fa273c941d8df5622059134b2149188c20fef58e2c68a5843ad5e40cb42e68195
-
SSDEEP
768:Z9QcoE2/yOPIxCW0RboucH8ChKd5gEKq1O56BiSA8I1Dg9s92A27Odf3/0o2Zt0O:ZNof/nPIxCWrL10HIlus127ORP06ta
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 536 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1640 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1640 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1380 9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1380 wrote to memory of 536 1380 9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe 28 PID 1380 wrote to memory of 536 1380 9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe 28 PID 1380 wrote to memory of 536 1380 9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe 28 PID 1380 wrote to memory of 536 1380 9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe 28 PID 536 wrote to memory of 1640 536 cmd.exe 30 PID 536 wrote to memory of 1640 536 cmd.exe 30 PID 536 wrote to memory of 1640 536 cmd.exe 30 PID 536 wrote to memory of 1640 536 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe"C:\Users\Admin\AppData\Local\Temp\9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 9ef66c2464d6da3246870b669aa0d1c56a3cb3a38874c3b5b1d57fbc6d0bba8c.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-