Analysis
-
max time kernel
14s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 16:42
Static task
static1
Behavioral task
behavioral1
Sample
60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe
-
Size
54KB
-
MD5
60f3c2f2b9b34bd801009fd5a59a3041
-
SHA1
bc6ccaeb9261891b270f703c441fd4d844c861a2
-
SHA256
60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521
-
SHA512
edcfd78662f3a5cff9a1dbac111cf543b54ee56363e74fb04b56b37b19b90575c70eaf0ba88d1b9c2019158bedcf183223f4bde9cc2b5969c6283a8c26f46871
-
SSDEEP
1536:Rm/HiMfFpKLwd/iAvEFAhEtuHHHHHHHHHHHHHHHKla:8iMfF9iRiEMHHHHHHHHHHHHHHHKla
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1720 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\711726633 = "C:\\Users\\Admin\\711726633.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe Token: SeShutdownPrivilege 1152 shutdown.exe Token: SeRemoteShutdownPrivilege 1152 shutdown.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1160 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 27 PID 1284 wrote to memory of 1160 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 27 PID 1284 wrote to memory of 1160 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 27 PID 1284 wrote to memory of 1160 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 27 PID 1160 wrote to memory of 984 1160 cMd.exE 29 PID 1160 wrote to memory of 984 1160 cMd.exE 29 PID 1160 wrote to memory of 984 1160 cMd.exE 29 PID 1160 wrote to memory of 984 1160 cMd.exE 29 PID 1284 wrote to memory of 1152 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 30 PID 1284 wrote to memory of 1152 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 30 PID 1284 wrote to memory of 1152 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 30 PID 1284 wrote to memory of 1152 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 30 PID 1284 wrote to memory of 1720 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 32 PID 1284 wrote to memory of 1720 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 32 PID 1284 wrote to memory of 1720 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 32 PID 1284 wrote to memory of 1720 1284 60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe"C:\Users\Admin\AppData\Local\Temp\60cc164598b796340c50ebe9465e48f9b572a946feedd5433c80c9c135218521.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cMd.exEcMd.exE /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 711726633 /t REG_SZ /d "%userprofile%\711726633.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 711726633 /t REG_SZ /d "C:\Users\Admin\711726633.exe" /f3⤵
- Adds Run key to start application
PID:984
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\60CC16~1.EXE > nul2⤵
- Deletes itself
PID:1720
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1212
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:692