Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 16:13
Static task
static1
Behavioral task
behavioral1
Sample
078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe
Resource
win10v2004-20220812-en
General
-
Target
078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe
-
Size
100KB
-
MD5
4be2521f38bf81410b0e4dfb6db55580
-
SHA1
c7824388befeb8e3c1d623c52f452a9b20b474f7
-
SHA256
078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4
-
SHA512
0a23349edcbbd917e638e2362933f3db5054062e6bd74977f909e7c5d25ffcc3c7f58be98a09e59f2e9fdcfe369fa18ccfe68838ed8ce6f915f63f49cb2c26c0
-
SSDEEP
1536:v9qpcVFy1ZxwKqFglZ0bACOdNQnFlfLT1B:Xy1ZxwhusfLT1
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1444 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1444 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1652 078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1640 1652 078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe 29 PID 1652 wrote to memory of 1640 1652 078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe 29 PID 1652 wrote to memory of 1640 1652 078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe 29 PID 1652 wrote to memory of 1640 1652 078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe 29 PID 1640 wrote to memory of 1444 1640 cmd.exe 31 PID 1640 wrote to memory of 1444 1640 cmd.exe 31 PID 1640 wrote to memory of 1444 1640 cmd.exe 31 PID 1640 wrote to memory of 1444 1640 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe"C:\Users\Admin\AppData\Local\Temp\078d14ff53140f183d73608d7f1e4ade5d3851467aab8906529acd97227b74d4.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 078d14ff53140f183d73608d7f1e4ade5d2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-