Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe
Resource
win10v2004-20220812-en
General
-
Target
4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe
-
Size
64KB
-
MD5
a011c05d2e350d8191d2335fa20b3b70
-
SHA1
b59f883cbdd78f85e9a8fa3e7782c65d9c15d6ff
-
SHA256
4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f
-
SHA512
c870d3d5a1da83976ba77758653479bbcbe21958f11fb5cb57a7acd49332103ee3f7c8f6ede789188e333fa9c854ff665f748b93ba31b5a6a50b2bfbf5185098
-
SSDEEP
768:ohe04EpnIPz8v96hkbObB6awrN0ocEnaLj8+IBfCylsCclAYbiXX2:oY044I78v96uaZEnaLj8bh+lW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 524 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1996 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1056 4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1056 wrote to memory of 524 1056 4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe 27 PID 1056 wrote to memory of 524 1056 4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe 27 PID 1056 wrote to memory of 524 1056 4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe 27 PID 1056 wrote to memory of 524 1056 4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe 27 PID 524 wrote to memory of 1996 524 cmd.exe 29 PID 524 wrote to memory of 1996 524 cmd.exe 29 PID 524 wrote to memory of 1996 524 cmd.exe 29 PID 524 wrote to memory of 1996 524 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe"C:\Users\Admin\AppData\Local\Temp\4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 4a7eac8dc30ab553c2c57d00fb2180c2b4520bbe81e9978ac5a7a2d58454184f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-