Analysis
-
max time kernel
21s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-10-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe
Resource
win10v2004-20220812-en
General
-
Target
adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe
-
Size
370KB
-
MD5
5cf7fc7c80c42516bd3854417ccf6740
-
SHA1
049b0b593cedc880f46436b3134b5d4783de415d
-
SHA256
adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d
-
SHA512
d7e7db1d4b6ee03135fd1383323880881f4efbc6254903bf78adc18fdf9c9af8730456189ef55ae2be64e695656dff57ad8c9faed574c65035d9664e318daa7d
-
SSDEEP
6144:is9nB3cwgQccgBs9Hu5qRY41QnMWGMRosf9WSf4VzQtwHwwnn8rVN1c:viwgQcctH8qP1QnxGioqrwfHZslc
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1088 cmd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.execmd.exedescription pid process target process PID 1732 wrote to memory of 1088 1732 adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe cmd.exe PID 1732 wrote to memory of 1088 1732 adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe cmd.exe PID 1732 wrote to memory of 1088 1732 adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe cmd.exe PID 1732 wrote to memory of 1088 1732 adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe cmd.exe PID 1088 wrote to memory of 1740 1088 cmd.exe attrib.exe PID 1088 wrote to memory of 1740 1088 cmd.exe attrib.exe PID 1088 wrote to memory of 1740 1088 cmd.exe attrib.exe PID 1088 wrote to memory of 1740 1088 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe"C:\Users\Admin\AppData\Local\Temp\adc9b4cb1e28544650105ab18a56bead0d8e2f2bbf77156683b5331b6060140d.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\588D.bat" "C:\Users\Admin\AppData\Local\Temp\ADC9B4~1.EXE""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\ADC9B4~1.EXE"3⤵
- Views/modifies file attributes
PID:1740
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72B
MD5f44ecc9db8cde52fb2432eeebe3cb2fb
SHA10886922986f2a360a4b94c8c0e9cfea4265d47c2
SHA256f20bc5313d4fb0c4cd91fcded4a000ea048532478f76ab15fbb14ba2d8eabcb4
SHA5126456403e76789511571acff87c424c4a80eb3f9522f87f3a1d1f932d635539ab8922062110e99a6d9de2b7499ac166b350a052be270188f8349e1041633b775f