Analysis
-
max time kernel
130s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe
Resource
win10v2004-20220812-en
General
-
Target
44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe
-
Size
717KB
-
MD5
7b5f311ef69b3cb1cb806683453f0db0
-
SHA1
648a4bc37e00fb031cb86dbb7067a547d0aa0b0d
-
SHA256
44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5
-
SHA512
bdb6abca125264eeac75dc2ae2ca7eaac6fb6a0243f738021b333c319c71b3e25e05379975b277f2316287818ca4c0a2356a247653ff425e5f0de52bfd021405
-
SSDEEP
12288:iQFaPRjtbxh7FzQ52W9l4SB9JppABXB66EKbIeZyhkcGCd1nsvn95AK6z3XNP3uL:iQFsNtlhFzgP9aSB9xUgX+GhrGCd1svF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4496-134-0x00000000022E0000-0x0000000002426000-memory.dmp upx behavioral2/memory/4496-137-0x00000000022E0000-0x0000000002426000-memory.dmp upx behavioral2/memory/4496-138-0x00000000022E0000-0x0000000002426000-memory.dmp upx behavioral2/memory/4496-139-0x00000000022E0000-0x0000000002426000-memory.dmp upx behavioral2/memory/4496-140-0x00000000022E0000-0x0000000002426000-memory.dmp upx behavioral2/memory/2764-142-0x0000000002160000-0x00000000022A6000-memory.dmp upx behavioral2/memory/2764-145-0x0000000002160000-0x00000000022A6000-memory.dmp upx behavioral2/memory/2764-146-0x0000000002160000-0x00000000022A6000-memory.dmp upx behavioral2/memory/2764-147-0x0000000002160000-0x00000000022A6000-memory.dmp upx behavioral2/memory/2764-148-0x0000000002160000-0x00000000022A6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe Token: SeCreatePagefilePrivilege 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2764 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe 82 PID 4496 wrote to memory of 2764 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe 82 PID 4496 wrote to memory of 2764 4496 44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe"C:\Users\Admin\AppData\Local\Temp\44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe"C:\Users\Admin\AppData\Local\Temp\44b7e09ca937bdaa84a10db1cd27e001fd1fded3df3cea49ef0566e82244fab5.exe" /_ShowProgress2⤵PID:2764
-