Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe
Resource
win10v2004-20220812-en
General
-
Target
54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe
-
Size
33KB
-
MD5
791e41b7f0677ebe1a4637ba9aeaff60
-
SHA1
c088af7705736c28baf9eb4ed8c6b4bb030e5d7b
-
SHA256
54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288
-
SHA512
a36a180ff9117b7a18737dafe16eca224708027dc2bd4e2a17cfe80fab9d301755e49835bcc89d1def091c8c652f09a9dba34001c46c69e000f9a54c6e5e3e57
-
SSDEEP
384:ZZyIquqndVRaf/mspUgqsJGE2bh0nCWSynIxLT6aXLA0JvOfEdS4EdThU:XyIquqdVsZWsCbkIL+mAe4Ekjd+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1312 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1596 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1596 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1600 54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1312 1600 54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe 28 PID 1600 wrote to memory of 1312 1600 54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe 28 PID 1600 wrote to memory of 1312 1600 54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe 28 PID 1600 wrote to memory of 1312 1600 54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe 28 PID 1312 wrote to memory of 1596 1312 cmd.exe 30 PID 1312 wrote to memory of 1596 1312 cmd.exe 30 PID 1312 wrote to memory of 1596 1312 cmd.exe 30 PID 1312 wrote to memory of 1596 1312 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe"C:\Users\Admin\AppData\Local\Temp\54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 54c1063dea2bd9c59aed05741ca3a4924fbc5d962021893e2aa9c90c54fa9288.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-