Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 02:38
Static task
static1
Behavioral task
behavioral1
Sample
30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe
Resource
win10v2004-20220812-en
General
-
Target
30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe
-
Size
49KB
-
MD5
7b7c3a4c2f92ad6941501f872a5f2170
-
SHA1
227bee106a163a2c9b24f2426299a15c5e5c8414
-
SHA256
30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c
-
SHA512
74b3f3a5def23523170d8993ee929c216add733319f174b8c4f43e28cc2306638dc72d4d792598f7ff4df423a49a118fecce4632001365874860a58045f5baab
-
SSDEEP
768:0bA5Md/TWXMqTvviaqWi2Pbm+Oyac/7k:085MdCXMqTvv/jmPA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1096 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1652 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1652 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 364 30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 364 wrote to memory of 1096 364 30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe 29 PID 364 wrote to memory of 1096 364 30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe 29 PID 364 wrote to memory of 1096 364 30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe 29 PID 364 wrote to memory of 1096 364 30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe 29 PID 1096 wrote to memory of 1652 1096 cmd.exe 31 PID 1096 wrote to memory of 1652 1096 cmd.exe 31 PID 1096 wrote to memory of 1652 1096 cmd.exe 31 PID 1096 wrote to memory of 1652 1096 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe"C:\Users\Admin\AppData\Local\Temp\30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 30b71dabe47603f2ceacb349420bc413ebc8f5e4e24315ce0a053f8a77f6a34c.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-