Analysis
-
max time kernel
84s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe
Resource
win10v2004-20220812-en
General
-
Target
66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe
-
Size
516KB
-
MD5
7061bccb53ea7df25866ae2cf390b2f5
-
SHA1
41c8e888b960a01ae823a09cc61953118e67c5a0
-
SHA256
66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313
-
SHA512
8f15970b4cf7698976de89c93aa72379b6950232c8804088ddf72a1d6b259848844300530008c494c852e7dbcab428a66bff25fb1d8a7b5df8a67831a89601bf
-
SSDEEP
1536:PjPqTrLutEGbGa4ItmbSnK0xrPgpOtnK0xrPgpOBnK0xhxg8Xo:PjPqTobG6nK4zgEtnK4zgEBnK47gyo
Malware Config
Signatures
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\DebugAssert.crw => C:\Users\Admin\Pictures\DebugAssert.crw.getfucked 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe File renamed C:\Users\Admin\Pictures\GetTest.raw => C:\Users\Admin\Pictures\GetTest.raw.getfucked 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe File renamed C:\Users\Admin\Pictures\InvokeStep.raw => C:\Users\Admin\Pictures\InvokeStep.raw.getfucked 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe File renamed C:\Users\Admin\Pictures\PopRestart.raw => C:\Users\Admin\Pictures\PopRestart.raw.getfucked 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe -
Deletes itself 1 IoCs
pid Process 1660 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
pid Process 2040 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1308 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1660 1308 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe 28 PID 1308 wrote to memory of 1660 1308 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe 28 PID 1308 wrote to memory of 1660 1308 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe 28 PID 1308 wrote to memory of 1660 1308 66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe 28 PID 1660 wrote to memory of 2040 1660 cmd.exe 30 PID 1660 wrote to memory of 2040 1660 cmd.exe 30 PID 1660 wrote to memory of 2040 1660 cmd.exe 30 PID 1660 wrote to memory of 2040 1660 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe"C:\Users\Admin\AppData\Local\Temp\66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe"1⤵
- Modifies extensions of user files
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 2 && Del /Q /F C:\Users\Admin\AppData\Local\Temp\66120938887b4d13abee307e24fe6d05261b21dede4170d2fe15011574db8313.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- Delays execution with timeout.exe
PID:2040
-
-