Analysis
-
max time kernel
83s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 11:20
Behavioral task
behavioral1
Sample
c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe
Resource
win10v2004-20220812-en
General
-
Target
c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe
-
Size
1.6MB
-
MD5
69c60c7e1b8ba1f1a4c687c4bb476e96
-
SHA1
66e8488b0b660c3ae6c2e955fd5ccf48d33b1088
-
SHA256
c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef
-
SHA512
ac059c24bc2fb8d4ce49346dceae0b191c38dba32dd5b6b8b6e3821bf74fbf8cd97d4873434e14feac266a8616050710e3f64d546b1ad27c05b5e938d6becf6b
-
SSDEEP
24576:OkWYldr5HE+wS7aPK3v9oE3IfFAnQDafmP/UDMS08Ckn3:OkWk5cS7a+9XYaQmfmP/SA8N
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2244 c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe 2244 c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe 2244 c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4748 2244 c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe 82 PID 2244 wrote to memory of 4748 2244 c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe 82 PID 2244 wrote to memory of 4748 2244 c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe"C:\Users\Admin\AppData\Local\Temp\c8dde67c39a7356c76a22ec4a5747bba24a7887cdc2c55b67bcd3787bdf088ef.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:4748
-