Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 00:02
Behavioral task
behavioral1
Sample
793249f446949e78a966255954e384ac3c08321833a92b9d7b09d3091183bd9a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
793249f446949e78a966255954e384ac3c08321833a92b9d7b09d3091183bd9a.exe
Resource
win10v2004-20220901-en
General
-
Target
793249f446949e78a966255954e384ac3c08321833a92b9d7b09d3091183bd9a.exe
-
Size
58KB
-
MD5
90fef78b18be560caefc6574fef6959c
-
SHA1
98593cfb1cbae0d77553da4af2bc8992d777d05d
-
SHA256
793249f446949e78a966255954e384ac3c08321833a92b9d7b09d3091183bd9a
-
SHA512
360bfc506370568505123b84d6d3c2e362b129ed68399416cb9963f6a6545a289bf74918145f902e2a20acff44c8754bd7c22480869f56925f7f87608bfeabd3
-
SSDEEP
1536:ocK58dTY/3VDmmLn2Uz5HExKoZhHa0DZRWabI:VK5welD3n2EZExKoZllOabI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3716-132-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3716-133-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WizSearch = "C:\\Program Files (x86)\\WizSearch\\WizSearch.exe" 793249f446949e78a966255954e384ac3c08321833a92b9d7b09d3091183bd9a.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\windows\CurrentVersion\Run 793249f446949e78a966255954e384ac3c08321833a92b9d7b09d3091183bd9a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.