Analysis
-
max time kernel
40s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe
Resource
win10v2004-20220812-en
General
-
Target
932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe
-
Size
872KB
-
MD5
8053da09de1b6e32711b8cf32e2b288a
-
SHA1
7ce70fb35354ec579f41a25e7054f052b9a43244
-
SHA256
932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831
-
SHA512
1ae327ef97c5727648e187ef6298109be7f4e5c87bfa43acf444f8ab0c164cbbc48fdc241df2d1fba442aad12adbda9330a9b8313158ea0e9d8b1aa5abad0d24
-
SSDEEP
12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aC/N9+AE/oOiafSPkHeS:uRmJkcoQricOIQxiZY1iaC/TKwVqSP5S
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1924 set thread context of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27 PID 1924 wrote to memory of 2024 1924 932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe"C:\Users\Admin\AppData\Local\Temp\932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe"C:\Users\Admin\AppData\Local\Temp\932ecc4f79fd5aa6c3669eab451f3433a2bd6c377c15fea157d29c0e1505a831.exe"2⤵PID:2024
-