Analysis

  • max time kernel
    158s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 17:35

General

  • Target

    db04632b8bfe5299d94e51a667cc8fa69d88f66773777d294a359f30d61c8b69.exe

  • Size

    679KB

  • MD5

    6cc7846cd63b22e74b5b237ddb271290

  • SHA1

    7330da8ca9ac47bcdf04f6ed67684a66b9d0a975

  • SHA256

    db04632b8bfe5299d94e51a667cc8fa69d88f66773777d294a359f30d61c8b69

  • SHA512

    2e18419c64656c88fdd62e70f4e801befd0018915b546f69f531f1fa318663cb2ebaf86d83f6fb6449dd12424c2c00e069bb5daeda52addab8bea1443e296701

  • SSDEEP

    12288:lXmh3HpZBFn4D7ejo2znTdxgqXMDXWmRSB39k8ha6LWfSYvx0YwGIwHvyO/UCPAJ:QR5d4C6jqzX0x0YwGhPZUCISTQ

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db04632b8bfe5299d94e51a667cc8fa69d88f66773777d294a359f30d61c8b69.exe
    "C:\Users\Admin\AppData\Local\Temp\db04632b8bfe5299d94e51a667cc8fa69d88f66773777d294a359f30d61c8b69.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4076

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4076-133-0x00007FFDDEA30000-0x00007FFDDF466000-memory.dmp

          Filesize

          10.2MB

        • memory/4076-134-0x000000001EB00000-0x000000001EB05000-memory.dmp

          Filesize

          20KB

        • memory/4076-135-0x000000001EAFC000-0x000000001EB00000-memory.dmp

          Filesize

          16KB

        • memory/4076-136-0x000000001EAF6000-0x000000001EAFC000-memory.dmp

          Filesize

          24KB

        • memory/4076-137-0x000000001EB00000-0x000000001EB05000-memory.dmp

          Filesize

          20KB