Analysis
-
max time kernel
46s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe
Resource
win10v2004-20220812-en
General
-
Target
545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe
-
Size
93KB
-
MD5
58554e6adedb762a563352da479d7960
-
SHA1
7b656456dfec5ee8459142aff3358dd9748bf4cd
-
SHA256
545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5
-
SHA512
81db4bae71a4c73538624ecdbba20c98bb56ed91622bc1a4f4188ea30b1019244aad730715c0ef13c7b5b28c5212499f5ed12289ef078da390b3280462ba816b
-
SSDEEP
768:tA8LQP0+IEZJ0z6GbKpTvK4P6ZV03sf/+zj2Oi5X54n7CcVsDWd3vNJdIEO83HKV:tOhIEA2pTy43sfU7CcVVOiZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1756 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 596 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 596 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1308 545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1756 1308 545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe 29 PID 1308 wrote to memory of 1756 1308 545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe 29 PID 1308 wrote to memory of 1756 1308 545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe 29 PID 1308 wrote to memory of 1756 1308 545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe 29 PID 1756 wrote to memory of 596 1756 cmd.exe 31 PID 1756 wrote to memory of 596 1756 cmd.exe 31 PID 1756 wrote to memory of 596 1756 cmd.exe 31 PID 1756 wrote to memory of 596 1756 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe"C:\Users\Admin\AppData\Local\Temp\545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 545fb939f933c824c756db84a5ce8a12c41fbaffef010ca415d74c4130ca9ef5.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-