Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe
Resource
win10v2004-20220812-en
General
-
Target
cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe
-
Size
31KB
-
MD5
6da6cf812fd792193b4b912b24aefca0
-
SHA1
a01ec7fe7a71e5f2c418431b479fec21aacda4c7
-
SHA256
cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20
-
SHA512
6aac1193c3245197366b426971920bc7686f948d9174690bf3a002c2fe9c89f3fc88ba472742acb26cd26f3934c0b08d7e16168482c66f8a5c0729634a1c2815
-
SSDEEP
768:Sf0uvhO0PSK4FEJsN4UakIguC+WUjAFbk3jzh13w1SOwUvxCimOFV5:SfnhzPSK4+JU4UZIguC+dUlk3jzh13wR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 512 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1680 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2016 cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2016 wrote to memory of 512 2016 cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe 28 PID 2016 wrote to memory of 512 2016 cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe 28 PID 2016 wrote to memory of 512 2016 cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe 28 PID 2016 wrote to memory of 512 2016 cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe 28 PID 512 wrote to memory of 1680 512 cmd.exe 30 PID 512 wrote to memory of 1680 512 cmd.exe 30 PID 512 wrote to memory of 1680 512 cmd.exe 30 PID 512 wrote to memory of 1680 512 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe"C:\Users\Admin\AppData\Local\Temp\cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del cd40022729a4915af01eb389bd49c26b539d78e45bb9cd90a182c86fd08b1c20.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-