Analysis

  • max time kernel
    138s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 00:11

General

  • Target

    fead6c78762e7ff41ce24ed951ae751a786c45e429bd5c623553232e1e5ce218.exe

  • Size

    70KB

  • MD5

    923fcf84b6b15d9d9f007ee408d508d0

  • SHA1

    ebfb6012613cbf1d1344a0e8879a3f780fe204e4

  • SHA256

    fead6c78762e7ff41ce24ed951ae751a786c45e429bd5c623553232e1e5ce218

  • SHA512

    ee1125e94851030b9aec2d7b000fe5d8af799664946f919d5951963fcc75e8d684bb185f550d9ddad9e73db37c35668cdd930800caf392ff89cd7fcecfffad9b

  • SSDEEP

    768:AlxqyjUgf6NmaeKlbpOlEeUSvaDBAy1cEEoznVesIuvJ06GwkY+B71ZU9fGo8K:AZUuKlbsLFIAPEEPs1vC6GwkY+6LR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fead6c78762e7ff41ce24ed951ae751a786c45e429bd5c623553232e1e5ce218.exe
    "C:\Users\Admin\AppData\Local\Temp\fead6c78762e7ff41ce24ed951ae751a786c45e429bd5c623553232e1e5ce218.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:276
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "
      2⤵
      • Deletes itself
      PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sanfdr.bat

    Filesize

    338B

    MD5

    14d841b3a1480ec2550611457ecc17b0

    SHA1

    3bd2a3980d7105e63053bd7e1a75173479c4f473

    SHA256

    fcba40436a1131e47cb65ed6d5aa30908b91c2a14ab59219aae62b168ac78d6c

    SHA512

    b17e7a4f30e0891e270b8ea97e0a861cfe2fbb82c7896e694173d8a3100f9ba07531b1a3cb34f6a808d63d2755ba2885923b385cd488dc59d32b63f4fe03adb0

  • memory/276-54-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB

  • memory/276-55-0x0000000000030000-0x000000000005E000-memory.dmp

    Filesize

    184KB

  • memory/276-57-0x0000000000030000-0x000000000005E000-memory.dmp

    Filesize

    184KB