Analysis

  • max time kernel
    40s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 17:15

General

  • Target

    1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe

  • Size

    209KB

  • MD5

    83ad8f6b1f80b9e24c4083cb346497f0

  • SHA1

    6740b46285d95f5dfa2ab2902303b20ba6da137b

  • SHA256

    1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71

  • SHA512

    ae6a4f4bf83f99871bad6b71d5a5fe894f84d31d0dc610694d7475e632cecdb78f638e35bfb273dbce302b908d9b2da2d8e7ede3cce4231f74936b11bc28e9c0

  • SSDEEP

    3072:UDzwcn27u7rVWikKUJCHIlG1PfY+6BUUh8Chm4/YtniS/jfEMOYqaxudj1:UDzwcn267+EIEFY+6El/jfDzcz

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe
    "C:\Users\Admin\AppData\Local\Temp\1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1416-54-0x0000000075E81000-0x0000000075E83000-memory.dmp

    Filesize

    8KB

  • memory/1416-55-0x0000000001000000-0x0000000001079000-memory.dmp

    Filesize

    484KB

  • memory/1416-56-0x00000000742D1000-0x00000000742D3000-memory.dmp

    Filesize

    8KB

  • memory/1416-57-0x0000000001000000-0x0000000001079000-memory.dmp

    Filesize

    484KB