Analysis
-
max time kernel
35s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:46
Static task
static1
Behavioral task
behavioral1
Sample
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe
Resource
win10v2004-20220812-en
General
-
Target
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe
-
Size
216KB
-
MD5
772244c26c27e43087bc53f89ca70bb0
-
SHA1
952284125cadb2f4bc31e43f2ea14bec8c14da76
-
SHA256
542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d
-
SHA512
67c1d1841e96cc420daa49040541212704d62c89766957ac338c118219ca07418433dbf3779a0b800e260db994a3304880f31fd9346f071c3264b0d12e326372
-
SSDEEP
3072:ayPrmjY+uoFk7umh3ZOmNqr+3b1KlfwUGYXLzNo8qq56+BZGD2Nt23:1oFuD58KbAbX9oRqnC2Nt23
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1648 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1208 set thread context of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 1208 wrote to memory of 2044 1208 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 27 PID 2044 wrote to memory of 1648 2044 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 28 PID 2044 wrote to memory of 1648 2044 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 28 PID 2044 wrote to memory of 1648 2044 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 28 PID 2044 wrote to memory of 1648 2044 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 28 PID 2044 wrote to memory of 1648 2044 542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe"C:\Users\Admin\AppData\Local\Temp\542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe"C:\Users\Admin\AppData\Local\Temp\542021936d68fd14bd868845205fe652011c390af1e86b86b4117e6439687d3d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
PID:1648
-
-