Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe
Resource
win10v2004-20220812-en
General
-
Target
4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe
-
Size
84KB
-
MD5
27e64a118e3cff3aafa85b3726666621
-
SHA1
b326fb0a6539c1034d333a87a410d5b00a8e3a5b
-
SHA256
4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946
-
SHA512
e825104bfa6cc9bda99a89066166f7c9d247da4f6e6d8d93bdcd6b622603454aa0341dd8bf8fd01a126178e84869d12f1c10671b49ee1001b36fd499f41e4aa4
-
SSDEEP
1536:egJHZs0kDvxLN3CxCuAh1Aga2yM4LlX0tXTcJf:egtG0kt13h1GpLlX02J
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28 PID 1932 wrote to memory of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28 PID 1932 wrote to memory of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28 PID 1932 wrote to memory of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28 PID 1932 wrote to memory of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28 PID 1932 wrote to memory of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28 PID 1932 wrote to memory of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28 PID 1932 wrote to memory of 668 1932 4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe"C:\Users\Admin\AppData\Local\Temp\4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exeC:\Users\Admin\AppData\Local\Temp\4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.exe2⤵PID:668
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4b963b838eba615aed9d48e6751ed0f9b69cfdac9c6636896e66784cf35aa946.jpg
Filesize9KB
MD51aa773ce36ff38de30b7e7c3ae13d4a7
SHA1d2130fb97b316452a7f9eb2f11a389ced6928b48
SHA2560f802f794550fcb2adaf8ab9d099b41604eb39bc30b99d2daa6703521d14efef
SHA51252fa2745a5c108b7f65d64576c2232228f13a26a534f5cb4ba9f90ed5abc871494798e765194dedb785c60e907a1ae7f405b566d6e6657056ca1ef2198a199d1