Analysis
-
max time kernel
28s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe
Resource
win10v2004-20220901-en
General
-
Target
1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe
-
Size
100KB
-
MD5
4d073ef4844fe3ccca988593d11f9e10
-
SHA1
d809fdcd4c94ea76077669f0bd526af68dd2e958
-
SHA256
1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7
-
SHA512
9ec38b409d789501e1d07517c759d2fad30bb1c6b1f1a4646c64eb7d2192586769335a0994dd9c699c3bfa818e098706bbe81c4887335f8765783eb2e9f4677f
-
SSDEEP
1536:VfxlXHYxDGYskKZ/p+ceJfPDevOyuS5vRTprzjOLPFB5zz:V5lofeZ//eJE9RifVz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2012 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1808 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1808 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1928 1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2012 1928 1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe 28 PID 1928 wrote to memory of 2012 1928 1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe 28 PID 1928 wrote to memory of 2012 1928 1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe 28 PID 1928 wrote to memory of 2012 1928 1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe 28 PID 2012 wrote to memory of 1808 2012 cmd.exe 30 PID 2012 wrote to memory of 1808 2012 cmd.exe 30 PID 2012 wrote to memory of 1808 2012 cmd.exe 30 PID 2012 wrote to memory of 1808 2012 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe"C:\Users\Admin\AppData\Local\Temp\1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 1ba41c7d0edf0429c57788cc0b653b048089714c049a517060a422227745f6b7.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-