Analysis
-
max time kernel
45s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe
Resource
win10v2004-20220812-en
General
-
Target
ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe
-
Size
84KB
-
MD5
10ae22ec20c3d7de1e4fa9659d72e8c0
-
SHA1
32e3e4cacf791df1ea982c7d8203e8b88f87f4da
-
SHA256
ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584
-
SHA512
585caa058e603a1ff9f13d7c4454f2587e33ad4c95d32f0d104fc0212675924c2dee69f70c99d050669865aea4f3323c243b2781fb1743778dabd25ac12b5790
-
SSDEEP
1536:0jwr+Ucxh6+Nas8ZBG8QV2Jk0sL/joNPQO1:G3xRlVxB/EJD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1664 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1328 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1328 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1204 ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1664 1204 ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe 28 PID 1204 wrote to memory of 1664 1204 ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe 28 PID 1204 wrote to memory of 1664 1204 ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe 28 PID 1204 wrote to memory of 1664 1204 ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe 28 PID 1664 wrote to memory of 1328 1664 cmd.exe 30 PID 1664 wrote to memory of 1328 1664 cmd.exe 30 PID 1664 wrote to memory of 1328 1664 cmd.exe 30 PID 1664 wrote to memory of 1328 1664 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe"C:\Users\Admin\AppData\Local\Temp\ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del ab636ddd9646e8e98a21672149201588725849bfd1cc358c09a12d41c0c0c584.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-