Analysis
-
max time kernel
33s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe
Resource
win10v2004-20220901-en
General
-
Target
30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe
-
Size
116KB
-
MD5
639057a018fa6488220c920afbd308b0
-
SHA1
6dd7b07dc09afb95124c596fa03d890c25b3617e
-
SHA256
30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e
-
SHA512
47380e97ea31605ead99aa58963a7ffdeb61f5f23da9957c39255a1a87e03ebe4a34544e42efbaf28a2b4ec912a34593c779eb83395955bdb0def39698557834
-
SSDEEP
1536:yzp8ew61Utg1E5meXe5QvcPrulffEwZWsy1lZZNheyW02MAh:GKx5meIrulffEwZWswelt
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1548 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 1624 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1624 AUDIODG.EXE Token: 33 1624 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1624 AUDIODG.EXE Token: SeDebugPrivilege 1548 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 968 30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 968 wrote to memory of 972 968 30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe 31 PID 968 wrote to memory of 972 968 30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe 31 PID 968 wrote to memory of 972 968 30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe 31 PID 968 wrote to memory of 972 968 30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe 31 PID 972 wrote to memory of 1548 972 cmd.exe 33 PID 972 wrote to memory of 1548 972 cmd.exe 33 PID 972 wrote to memory of 1548 972 cmd.exe 33 PID 972 wrote to memory of 1548 972 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe"C:\Users\Admin\AppData\Local\Temp\30f5b2c600bbf3689a350761d902d145d79ecea2a9d4eabf96a00ce7017fdc5e.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 30f5b2c600bbf3689a350761d902d145d72⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5581⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624