Analysis
-
max time kernel
18s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe
Resource
win10v2004-20220812-en
General
-
Target
234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe
-
Size
172KB
-
MD5
57eda7159ba1d0cd796213e836404290
-
SHA1
9b88b2c3a99d40c21aa0ce3959d49edb8f864699
-
SHA256
234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9
-
SHA512
b16079f06e116cb8e8d42d9cb0458652b643ca207bc10c377321868584b12b9f7b625e511072bc8c6416568776b43e9ee6290c567151dca7baf154b8f7cedd8e
-
SSDEEP
1536:m9Zk1MA1b96lU77m5dRloraXQl8MH5xtcl8jsQIrHoK7C9C6B:mQ1JYq7m5WWgl8MH5xtoSGyT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1976 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1004 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1004 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 908 234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 908 wrote to memory of 1976 908 234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe 28 PID 908 wrote to memory of 1976 908 234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe 28 PID 908 wrote to memory of 1976 908 234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe 28 PID 908 wrote to memory of 1976 908 234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe 28 PID 1976 wrote to memory of 1004 1976 cmd.exe 30 PID 1976 wrote to memory of 1004 1976 cmd.exe 30 PID 1976 wrote to memory of 1004 1976 cmd.exe 30 PID 1976 wrote to memory of 1004 1976 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe"C:\Users\Admin\AppData\Local\Temp\234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 234b091f54f23fc8c40a41f80421b7088e44d455a3fbf1dd059d9e656610fab9.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-