Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe
Resource
win10v2004-20220812-en
General
-
Target
1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe
-
Size
209KB
-
MD5
83ad8f6b1f80b9e24c4083cb346497f0
-
SHA1
6740b46285d95f5dfa2ab2902303b20ba6da137b
-
SHA256
1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71
-
SHA512
ae6a4f4bf83f99871bad6b71d5a5fe894f84d31d0dc610694d7475e632cecdb78f638e35bfb273dbce302b908d9b2da2d8e7ede3cce4231f74936b11bc28e9c0
-
SSDEEP
3072:UDzwcn27u7rVWikKUJCHIlG1PfY+6BUUh8Chm4/YtniS/jfEMOYqaxudj1:UDzwcn267+EIEFY+6El/jfDzcz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wab 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\" /vcard %1" 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard\Extension = ".vcf" 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\ = "vcard_wab_auto_file" 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\Content Type = "text/x-vcard" 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\ = "vCard File" 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\",1" 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1416 1a9f2500f7cde53135d5bc2e2e8cfb479536524b18a4e8eaf602ea65bad2ca71.exe